last executing test programs: 21m33.288950753s ago: executing program 32 (id=805): r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) listen(r0, 0x80000008) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)='[', 0x1}], 0x1}}], 0x1, 0x4000800) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x2}, 0x8) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}}}, 0x24}}, 0x20040084) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000061c0), r2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000000c0)='veno', 0x4) sendmmsg$inet(r4, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000740)="91f8a9849519def28691bbc4173c3d6f357de68907e50e997fc26e4c91ea4feb931647fc5393de1f0000000000002c847ecfbcfa0a026a6f96a4ffd844b1252fa8332e469c6b1aafc08e0e632da389ba8899e94ce0216d23bec00ff251e11ba4e19e7fe33f6d7635fbf6f16f1f0a381d1e3219c1cfa013b391b6623f164f55a0a33902f0c938d626905f8cd1fba51334c16b150281addd9ae74a51c0572bfcc1af96ea1177e68f6f60136d777fb081848b4eddb2ede3cd121b0a5630932fdbce2a202e9ad4", 0xc5}], 0x1}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d2", 0x6d}], 0x1}}], 0x2, 0x2090) sendmsg$FOU_CMD_GET(r2, &(0x7f0000006300)={0x0, 0x0, &(0x7f00000062c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000fedbdf250300000008000b00", @ANYRESDEC=r4, @ANYBLOB="08000600e0000002060001000004", @ANYRES8=r2], 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x44490) socket$inet6_sctp(0xa, 0x801, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) statx(0xffffffffffffffff, 0x0, 0x6000, 0x6, 0x0) 20m46.679695334s ago: executing program 33 (id=1130): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x8402, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8001, 0xf7f}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000980)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f00}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r1, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x9d, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x3f, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000100000000000000000000007112b8000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2000003, 0xc3072, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r5, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) r6 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r6, 0x0, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000070601080000000000000000000000000500010006"], 0x1c}}, 0x0) r7 = openat$selinux_policy(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x55, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x94}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r8, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) socket(0x2, 0x80805, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000480)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x38, 0x2}, @cond=[{0x2, 0x8005, 0x40, 0x9, 0x8001, 0xfc01}, {0x9, 0x6, 0x401, 0x2, 0x2000, 0x8}]}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000100)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x1c) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="98010000170a010400000000000000000a0000090900010073797a310000000008000740000000020900010073797a3000000000090002"], 0x198}, 0x1, 0x0, 0x0, 0x28040000}, 0x4800) 16m48.720422457s ago: executing program 34 (id=2340): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d40)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0xb0, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x88, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}, {0x50, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BITWISE_XOR={0x4}, @NFTA_BITWISE_MASK={0x20, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x15, 0x1, "a580969e400fb9cd462deb11ee15607497"}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x124}}, 0x0) r1 = semget(0x2, 0x3, 0x211) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="180500000000000000000000000000001800000020696c2500000000002020207b0af8ff000000007b510000000000000701000000feffffb702000008000000b703000000000000850000001900000095"], &(0x7f0000000180)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x4d}, 0x94) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000580)=[{0x4, 0x5, 0x1000}, {0x0, 0x7, 0x1800}, {0x0, 0x0, 0x800}, {0x2, 0x2}, {0x1, 0x9, 0x800}, {0x3, 0x7, 0x800}, {0x2, 0x3, 0x1000}], 0x7, &(0x7f0000000600)={r2, r3+60000000}) futex(0xfffffffffffffffe, 0x3, 0x1, 0x0, 0x0, 0x2) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x18, 0x1411, 0x1, 0x70bd29, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000800}, 0x4044010) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffff8, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2f, 0x28, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0xda1a0b6210925d15, 0x0, @fd, 0x0, 0x0, 0x1, 0x1}) io_uring_enter(0xffffffffffffffff, 0x4503, 0x20, 0x0, 0x0, 0x0) 16m32.75700939s ago: executing program 4 (id=2403): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x244}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) socket(0x2, 0x80805, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_tcp_int(r5, 0x6, 0x22, &(0x7f00000002c0)=0x9, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) socket(0x10, 0x3, 0x0) bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000400)={@map, 0x4, 0x7d1, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0}, 0x40) unshare(0x6a040000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4020000e66ad2e5"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}}, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x2241, 0x0) writev(r7, &(0x7f0000000100), 0x0) 16m32.500496114s ago: executing program 4 (id=2405): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000580)="63eced8e46aa7ce5a833c9f7b942", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 16m32.023024867s ago: executing program 35 (id=2405): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000580)="63eced8e46aa7ce5a833c9f7b942", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 16m21.769997116s ago: executing program 36 (id=2381): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x759, &(0x7f00000009c0)={[{@nojournal_checksum}, {@noblock_validity}, {@discard}, {@errors_remount}, {@data_writeback, 0x0}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@barrier_val={'barrier', 0x3d, 0x6}}, {@nodiscard}, {@nogrpid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x6}}, {@init_itable}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x765}}, {@norecovery}, {@abort}, {@dax_never}, {@init_itable_val={'init_itable', 0x3d, 0xfff}}], [{@audit}, {@fowner_lt}], 0x2c}, 0xa, 0x532, &(0x7f0000000480)="$eJzs3M9rHNcdAPDvrn7XUrV1f7pua7VuqWipZck/Dz3YpgVfWgotxb0UFEk2jmUnWArYRmA5BBtySPBf4CS3QP6B5JRcQhJySPA1JpBLQsAEXaz4ECbMzuxqV6vVL+9KyPp8YHe/8+bNznsz72nnzdtVALvWUPpUiOiPiM/6IwazxfoMQ9nL4sLcxLcLcxOFSJJ/f1Mo53u0MDdRyVrZbk++MFyMKL5UiP2Nu+2ZuX7j0vj09NTVPGFktphHl8cvTF2YujJ28uTRI30njo8da0k9OyrBvrP/u/uPiXN3n/nwrbS8SZ5cW49MqfzcvfE9VA/EUAzVH8saf1j3++4MAzVxoTN9Lm5fYVi3tNWmp6sr7f8xGB3lpcxg/P3FbS0c0FZJkiQ9DanVz7L5pFahkG2QJLcS4ClQiLVyLPsrADwlKh/0jxbSkercROM4+On28HSUR0BpvRfzR7amszyCHSplY6OuNu3/JxFxbv7xvco12G47/gDA1nv3dMSdM9l1R+WRrSnGz2ry/TCyuaFSRPwoIvZGxI8j4u2I+GlEOe/PI+IXNdsMrDkL0JXNP9VovP75tC8Pai9XWya9/vtrPrdVf/1XLXmpI18aKNe/q3D+4vTU4fyYDEdXT7o82vjW1dtq7/3t/qvN9j+UX/9VHun+09elHMWvO5fdoJscnx1/0npXPLxVPrA36+r/RZQnsTrzyav0ZV9E/HIT758es4t/evNXzdbX1T+tZ0P9X1kKS8s27txEgZZJXo/4Y3b+56Pu/GeV786jkdnLz4/MXL/xl4u185OjJ46PHRvpjempwyOVVtHoo09u/ysPG4YRq5z/Stdo60Taw1vR+4MV23915rKURtX52pmN7+P2gztNxzSbbf/dhf+U48r87LXx2dmroxHdhfnG9LGlba+N99XlT9v/8MGV+//eiO9ey7fbHxFpI/51RPwmIg7kZf9tRPwuIg6uUv8Pzvz+2WZDyKE0ddX6t1da/8kNnf9mwamPI1Ze1XHp/Xcadvxy1rxrz39XPL632DBhnp7/o+VoOE+ZHJ/tXateq5W0NniCQwcAAAA7xoGI6I9C8VB+o6k/isVDhyL2VO+gzMz++fxzL1yZzH4jUIquYuVO12DN/dDR/PZcupxuNVaznK4/Ur5vnCRJ0pcup+P36YHtrTrsenua9P/UVx3bXTqg7TY0j9bsF23AjrS8/z9Y95at/0IGsLVa8D0aYIfS/2H3Wnf/b9ev4IBts1L/vxmxuA1FAbbYSv3/vw0pp7akLMDWMv6H3Wvz/d+XAWCn8/kPu9K6fiS/iWDv2VXyFDrbs9PmQTGy4Mv/Z9Ve/l8AShGVlMo1zepv+HkxojUl7HjyCqYlzlP66s5pccWteqMVRzWKa+bp3MA/Ymga9LXoONcFxaWUwhqZ++LSP++3tYn2NDbI5a232thuVoIb7e4y5U7wxjb+aQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGiJ7wMAAP//shfFRw==") bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket(0xa, 0x3, 0xff) sendmsg$inet6(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0xa, 0xa, 0x4, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="1400000000edaa4fbecd997757407c0000002900004034000000c1f7000000000000"], 0x18}, 0x922bac8556bdad8e) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x4002000) r3 = socket$inet(0x2, 0x3, 0x30) syz_usb_connect(0x0, 0x24, &(0x7f0000000340)=ANY=[@ANYBLOB="120141014813442024040075ee69010203010902120001000010000d5da756e79f89d8d348e6c0aac6d0810f4005386de7e1eea9419a34ca96105c61496879285fd5b592546e5bd93825f41ac3b0ad292abc52ad3ca3a2992751bbd131aa88b44818b6c64075da0b3e8f0742c9c929a737f0ec86f7891b6a320ffa5ab5ea285b7618ca2e238c2db4c086fb6d24bebfbf2abc41f8cb62c6509b735d952100e8c2a40892f954546080f7f7b02dc5bd9f"], 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) getsockopt$inet_mreqsrc(r3, 0x0, 0x53, 0x0, &(0x7f0000000080)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = dup(r4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @empty, 0x3}], 0x1c) sendmsg$inet6(r4, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x4}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000004c0)="99", 0x1}], 0x1}, 0x4048043) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x3, 0xfffc, 0xe652, 0x2, 0x14, 0x8, 0xff}, 0x9c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_bond\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x8, @empty, 0x38d3}}, 0xfffffc, 0x31, 0xffff1896, 0x5, 0xa6, 0x0, 0x6}, 0x9c) mount$tmpfs(0x0, &(0x7f0000000540)='./cgroup\x00', 0x0, 0x0, 0x0) 12m12.091971343s ago: executing program 37 (id=4014): r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="00000055664ae93f729a6a2223f87cdd523d0000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r3, &(0x7f0000003a80)={&(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10, &(0x7f0000000dc0)=[{&(0x7f0000000200)=""/41, 0xfd83}], 0x1, 0x0, 0x0, 0x8000}, 0x48004) 1m27.959649235s ago: executing program 38 (id=10089): r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x560, &(0x7f0000000b00)="$eJzs3d9vW1cdAPDvvYnjrOuaFvYAE9ACg4Kq2o27VdNetr6A0DQJMfGAeOhC4kahdl1qZyyhEtnfMCSQeII/gQckHpD2xANvPCLxgJDGA1KBCtQigWR0rx3XS5zFm39t8ecj3d577vE933Oa2Of4OL4ngLl1ISL2ImIpIl6PiJXu+aS7xcudLXvcwwf31h89uLeeRLv92j+SPD87l19QfFzmk90ylyPiW1+P+F5yOG5zZ/fWWq1WvdtNl1v1O+Xmzu7lrfraZnWzertSubZ67coLV5+vjK2t5+u/uv+1rVe+/dvffPbdP+x99UdZtU5383rtGLNO0wu9OJnFiHhlEsFmYKG7X5pxPfhw0oj4RER8IX/+r8RC/tsJAJxk7fZKtFf60wDASZfmc2BJWoqINO0OAkqdObyn41RaazRbl242tm9vdObKzkYhvblVq145V/zTD/IHF5IsvZrn5fl5unIgfTUizkXET4pP5OnSeqO2MZshDwDMvSf7+/+I+HcxTUuloS4d8KkeAPCxsTzrCgAAU6f/B4D5o/8HgPkzRP/f/bB/b+J1AQCm44O9/z8zsXoAANNj/h8A5o/+HwDmyjdffTXb2o+697/eeGNn+1bjjcsb1eatUn17vbTeuHuntNlobOb37KkfV16t0biz+lxsv1luVZutcnNn90a9sX27dSO/r/eNamEqrQIA3s+58+/8MYmIvRefyLfoW8tBXw0nWzrrCgAzszDKxQYI8LFmtS+YX0N14fkg4fcTrwswGwNv5r088PC9ftbZvT1MEH9nBB8pFz89/Py/NZ7hZDH/D/Prw83/vzT2egDTZ/4f5le7nRxc83+plwUAnEgj/Alf+8fjGoQAM3XcYt7Hff4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8+h0RHw/krSUrwWeZv+mpVLEUxFxNgrJza1a9UpEnInzEVEoZunVWVcaABhR+reku/7XxZVnTx/MXUr+U8z3EfHDn7/20zfXWq27q9n5f/bOF/eXD6s8vm6EdQUBgDHL++9Kd9/3Rv7hg3vr+9vgKxcnUp/71+N/3aWI1x89uJdv+/GykxHL+Vji1L+SXg2WI+KZiFgYQ/y9tyLiU4Pan+RzI2e7K5/2x49u7KfGFT+JJI6Nn74nfprndfbZ4OuTY6gLzJt3rkfEy4Oe/2lcyPeDn//LY3pFvH+9U9j+a9+jvviL3UgLA+Jnz/kLw8Z47nffOHSyvdLJeyvimcVB8ZNe/OSI+M8OGf/Pn/nc2y8dkdf+RcTFGBy/P1a5Vb9Tbu7sXt6qr21WN6u3K5Vrq9euvHD1+Uo5n6Mu789UH/b3Fy+dOapuWftPHRF/eWD7l3rXfmnI9v/yv69/9/OPk8WD8b/yxcE//6cHxu/I+sQvDxl/7dSvj1y+O4u/cUT7j/v5Xxoy/rt/3d0Y8qEAwBQ0d3ZvrdVq1bsjHWTvQsdRzqGDrIrDPXh/uDha0L/EJFox7MGByhcm9b868YPF3lhxvCV/JytxQFa6/0uSvVV6/3KW4qisxRh4VTr2Vox08HBasWb3mgRMR1/nAwAAAAAAAAAAAAAAfEQd/32gwuhfawMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAJ+X8AAAD//7xIx1c=") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x310) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r4, &(0x7f00000000c0)=[{&(0x7f0000000600)=""/128, 0x80}], 0x1, 0x111, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000300)={0x24, r5, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40048021}, 0x40080) 1m22.504158177s ago: executing program 3 (id=10128): bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_io_uring_setup(0x1ea, &(0x7f0000000000)={0x0, 0xcc19, 0x130c8, 0x5, 0x30e}, &(0x7f0000000100), &(0x7f0000000200)) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x20130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x102260, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1f, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x6f}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x1, 0x4, 0x0, {{}, {0x0, 0x6}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4081}, 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xc, 0x2000000, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) quotactl_fd$Q_GETQUOTA(r0, 0xffffffff80000701, 0x0, &(0x7f0000000280)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f00000001c0), &(0x7f0000000240)=0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 1m22.503285577s ago: executing program 3 (id=10129): setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000bc00000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000008850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioprio_set$uid(0x3, 0xffffffffffffffff, 0x4000) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xc}, {0xffff, 0xfff3}, {0x0, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x2, 0x4}}]}, 0x2c}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="fc575bb3f61f94eee70200000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r6, {0x8}}, './file0\x00'}) ioprio_set$uid(0x3, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r7) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x20, r8, 0x9c3fa077fa966179, 0x0, 0x25dfdbfe, {{0x7e}, {@void, @val={0xc, 0x99, {0x7, 0x17}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x8004800}, 0x8) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x25, 0x1, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x2800050, &(0x7f0000003240)=ANY=[], 0x6, 0x342, &(0x7f0000000680)="$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") r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) socket(0x10, 0x803, 0x0) write$cgroup_int(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r10}}, 0x18) 1m22.132427311s ago: executing program 3 (id=10133): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x9, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf400"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) fcntl$lock(r0, 0x24, &(0x7f00000004c0)={0x0, 0x2, 0x1, 0x1}) 1m21.631559991s ago: executing program 3 (id=10135): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x369, 0xc000, 0xffffffff, 0x1a0002f5}) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x440, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xb}, 0x102640, 0x400, 0x0, 0x1, 0xffffffff, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000000)=0x1201a, 0x4) io_uring_enter(r0, 0x2219, 0x7721, 0x14, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x5) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x26, 0x1, 0x0, 0x10, 0x0, 0x7, 0x510, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x1}, 0x106200, 0x10004, 0x20da, 0x7, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, r1, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r4, &(0x7f0000000140)='.\x00', r3, &(0x7f0000000300)='./file0\x00', 0x41) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0xa0835c, &(0x7f0000000340)={[{@nolazytime}, {@abort}, {@lazytime}, {@init_itable}, {@nomblk_io_submit}, {@auto_da_alloc}, {@nouid32}], [{@flag='nomand'}, {@obj_type={'obj_type', 0x3d, 'GPL\x00'}}]}, 0x2, 0x47e, &(0x7f0000000c40)="$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") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000004000000040000000200000000190100", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffff7fff0300"/24, @ANYRES32=r5, @ANYBLOB="152fba594a1d4c2574ef193b90f4bb5430e8590a4ef659406a29c5d1b72118c2a1a1e0f44b4759fd64d8981c6c4db8e75e44f28161858e48e9375ba866c40bafd1d23a99c27caae295dd38fcb25085a627d815f060863007e09a68ec4717b296dccca98860ddd6583490870b6139ec455ca808b77615c3978d43c33e4c3b63db796b3ef322c593b72ee33f2c6f68ec6a7ba981abdcd9ae15cc9e5023f7b46726a89251ab8c59ccb6cf65c102d5736cf2c0eb8821e91d1c4def2546a1165e77b65b"], 0x50) r6 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffffffffffffffb, 0x48b01) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {}, 0xfffffff8, 0x85, &(0x7f0000000000)={0x4b5a9da54893e123, 0x1, 0x8, 0x2}, 0x8, 0x20400000, 0xc, 0x0, 0x0, 0x20000, 0x0}) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}) socket$netlink(0x10, 0x3, 0x0) close_range(r7, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711813000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r8 = socket(0x11, 0xa, 0x0) sendmsg$can_bcm(r8, &(0x7f0000000140)={&(0x7f0000000000), 0x12, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="70000000680000012cbd7000fddbdf25020004003c00000051083fe7a5e942b80000000000000000000000001800088014000300fe88000000000000000000000000010114000600fc0100000000000000000000000000011800088014000500fc010000000000000000000000000001"], 0x70}, 0x1, 0x0, 0x0, 0x4004000}, 0x4008000) unshare(0x2040600) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x121201, 0x0) 1m20.738796051s ago: executing program 3 (id=10140): perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xe, 0x4a718, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x100000000, 0xe}, 0x104b18, 0x6, 0x0, 0x1, 0x5, 0x4, 0xb, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x110}}, 0x4009010) pipe(&(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file1\x00', 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="646f74732c646f74732c646f747364636865636b3d72656c617865642c666d61736b3d3030303030303030303072ba86dc65c2a2303030303030303030303031352c6e6f646f74732c646973636172642c646d74732c00"], 0x0, 0x22d, &(0x7f0000000300)="$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") r0 = fsopen(&(0x7f0000000140)='mqueue\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0xa) fchdir(r1) fcntl$notify(0xffffffffffffffff, 0x402, 0x25) mq_open(&(0x7f000084dff0)='rmdF\x17\x16\xbc\xec', 0x6e93ebbbcc0884f2, 0x0, 0x0) pipe(&(0x7f00000000c0)) syz_clone3(&(0x7f0000000c40)={0x800000, &(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00), {0x24}, &(0x7f0000000a40)=""/220, 0xdc, &(0x7f0000000b40)=""/133, &(0x7f0000000c00)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) 1m20.614395759s ago: executing program 3 (id=10141): socket(0x11, 0x3, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc4}, &(0x7f00000006c0)={0x0, "8f21bac9a8cf9c29a251df0029bbcda8a79b46d9f75d828e905b8e077d37c76e07beded58d051c094df4759638c75870ab724824d3287c779258f41c0c12a108", 0x39}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000040)='.dead\x00', 0x0, &(0x7f00000004c0)='nogrpid', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="500000003f0001002cbd7000ffdbdf25010000003a0004002c4e2d", @ANYRESDEC=r0, @ANYRESDEC, @ANYRES32=r2], 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8008, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000380)={[{@grpquota}, {@nogrpid}, {@quota}, {@nobh}]}, 0x1, 0x511, &(0x7f0000000ac0)="$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") read(0xffffffffffffffff, 0x0, 0x0) getpid() quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000100)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000280)={0x7, 0x6, 0x800077, 0x20800000000412, 0x6, 0xf3, 0x80001000, 0xf67, 0x2}) mmap(&(0x7f00004f7000/0x2000)=nil, 0x2000, 0x3000007, 0x8010, r3, 0xffffd000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800002018210000", @ANYRES32, @ANYBLOB="0000000002000000b705000008000000850000000600000095"], &(0x7f00000000c0)='GPL\x00', 0x8, 0x1002, &(0x7f0000002500)=""/4098, 0x41100}, 0x94) r4 = socket(0x28, 0x5, 0x0) r5 = syz_io_uring_setup(0x4f6, &(0x7f0000000200)={0x0, 0x80fd, 0x1000, 0x1, 0x2cf}, &(0x7f0000000080)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0xffffffff, @my=0x1}, 0x0, 0x0, 0x1}) io_uring_enter(r5, 0x47bc, 0xf5, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect$hid(0x2, 0x36, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000080), 0x7, 0x42000) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000200)) 1m20.568870351s ago: executing program 39 (id=10141): socket(0x11, 0x3, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc4}, &(0x7f00000006c0)={0x0, "8f21bac9a8cf9c29a251df0029bbcda8a79b46d9f75d828e905b8e077d37c76e07beded58d051c094df4759638c75870ab724824d3287c779258f41c0c12a108", 0x39}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000040)='.dead\x00', 0x0, &(0x7f00000004c0)='nogrpid', r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="500000003f0001002cbd7000ffdbdf25010000003a0004002c4e2d", @ANYRESDEC=r0, @ANYRESDEC, @ANYRES32=r2], 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8008, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000380)={[{@grpquota}, {@nogrpid}, {@quota}, {@nobh}]}, 0x1, 0x511, &(0x7f0000000ac0)="$eJzs3c9vI2cZAOB3nDhxsmmTlh4AQbu0hQWt1km8bVT1AOWEEKqE6BGkbUi8URQ7jmKnNGEP2zNXJCpxgiN/AOeeuHNBcOOyHJD4EYE2SByMZjzOerN2Ntps7BA/jzSa+ebz+n2/tWa+zJt4JoCxdT0i7kfEVER8GBHz+f4kX+K9zpK+7uHhvbWjw3trSbTbH/wjyfrTfdHzb1LX8vcsRcQPvhPx4+TJuM39g63VWq26m7cXW/Wdxeb+wa3N+upGdaO6XamsLK8svXP77cpzG+tr9al868sPfn//Gz9N05rL9/SO41kknSH32x8RxeM4qcmI+N55gl0iE/l4pkadCM+kEBEvR8Tr2fE/HxPZpwkAXGXt9ny053vbAMBVV8hqYEmhnNcC5qJQKJc7NbxXYrZQazRbN+829rbXO7WyhSgW7m7Wqkt5rXAhiknaXs62H7UrnfZ0t307Il6KiJ9Pz2Tt8lqjtj7KH3wAYIxdOzH//3u6M/8DAFdcadQJAABDZ/4HgPFj/geA8WP+B4Dx05n/Z0adBgAwRKde/7sfEABcSer/ADBWvv/+++nSPsrvf73+0f7eVuOjW+vV5la5vrdWXmvs7pQ3Go2N7J499ae9X63R2Fl+K/Y+XvjmTrO12Nw/uFNv7G237mT39b5TLWav6nurbABgSF567bM/JemM/O5MtkTPsxyKI80MuGiFUScAjMzEqBMARsZf98D4Osc1vvIAXBF9HtH7mFK/Lwi12+32xaUEXLAbX1D/h3HVU//3V8AwZtT/YXyp/8P4areTsz7zP876QgDgclPjBwb8/v/lfP2b/JcDP1o/+YpPLzIrAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuNy6z/8t588Cn4tCoVyOeCEiFqKY3N2sVZci4sWI+ON0cTptL484ZwDgvAp/TfLnf92Yf3Pusa5Xrx1vTkXET375wS8+Xm21dv8QMZX8c7q7v/Vpvr8y/OwBgNOl1/rdeTpb91zIPzy8t9ZdhpnT374dEaVO/KPDqTg6jj8Zk9m6FMWImP1Xkrc7kp7axXnc/yQiPt9v/EnMZTWQzpNPT8ZPY78w1PiFx+IXsr7OOv2/+NxzyAXGzWfp+ee9fsdfIa5n6/7Hfyk7Q51ffv5L32rtKDsHPorfPf9NDDj/XT9rjLd+993O1syTfZ9EfHEyohv7qOf8042fDIj/5hnj//lLr74+qK/9q4gb0T9+b6zFVn1nsbl/cGuzvrpR3ahuVyoryytL79x+u7KY1agXB88Gf3/35ouD+tLxzw6IX3rK+L96xvH/+r8f/vArp8T/+hv94hfilVPip3Pi184Yf3X2t6VBfWn89QHjf9rnf/OM8R/85eCJx4YDAKPT3D/YWq3Vqrv/7xtzxc6ALks+Ni5iI/2EL0EafTe+NaxYU9G/62dvdA6BE13t9jPFGnTGeB5VN+AyOD7oI+I/o04GAAAAAAAAAAAAAADoaxjfWBr1GAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALi6/hcAAP//leLMXA==") read(0xffffffffffffffff, 0x0, 0x0) getpid() quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000100)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000280)={0x7, 0x6, 0x800077, 0x20800000000412, 0x6, 0xf3, 0x80001000, 0xf67, 0x2}) mmap(&(0x7f00004f7000/0x2000)=nil, 0x2000, 0x3000007, 0x8010, r3, 0xffffd000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800002018210000", @ANYRES32, @ANYBLOB="0000000002000000b705000008000000850000000600000095"], &(0x7f00000000c0)='GPL\x00', 0x8, 0x1002, &(0x7f0000002500)=""/4098, 0x41100}, 0x94) r4 = socket(0x28, 0x5, 0x0) r5 = syz_io_uring_setup(0x4f6, &(0x7f0000000200)={0x0, 0x80fd, 0x1000, 0x1, 0x2cf}, &(0x7f0000000080)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0xffffffff, @my=0x1}, 0x0, 0x0, 0x1}) io_uring_enter(r5, 0x47bc, 0xf5, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect$hid(0x2, 0x36, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000080), 0x7, 0x42000) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000200)) 1m12.229971427s ago: executing program 6 (id=10210): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x0, 0x0, 0x10000, 0x2, 0x4, 0x80000001, 0x4, 0x0, 0x1, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000740)=0x10001, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r1, 0x84, 0x84, &(0x7f0000000000)=""/4102, &(0x7f0000001040)=0x1006) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x16, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100000000000000010000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000b7080000000000007b8af8ff00000000b7080000001000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xe, 0x0, &(0x7f0000000000)="9dbaac999f69835fbc2825cd64f1", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f0000003080)={0x30, r7, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) connect$packet(r1, &(0x7f0000001140)={0x11, 0x10, r8, 0x1, 0x4, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3f}}, 0x14) 1m12.080198531s ago: executing program 6 (id=10212): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20048005}, 0x0) 1m11.96430617s ago: executing program 6 (id=10213): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20081, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000007c0)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@initdev}, &(0x7f0000000180)=0xfffffccb) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r6, 0x2) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r7, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000240)) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa}]}, &(0x7f00000005c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r9, &(0x7f0000000440), &(0x7f0000000040)=@udp=r8}, 0x20) r11 = fsmount(r0, 0x0, 0x0) fchdir(r11) openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r12 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r12, &(0x7f0000004200)='t', 0x1) 1m10.991244466s ago: executing program 6 (id=10224): socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x1}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1f, 0x14, &(0x7f0000001040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000000580)=ANY=[@ANYBLOB="2cf0909ce1ff85920c026d2d17ba70f378211bd2882be7182a49062e6e7205926d70fdd07772f201f1d9d909361f86fdd91f51a145a7f8951e911c522da89563ff7ccdd97e7d609c9db1b0a7d56d968955057b9ff03a093732d1f197ba4fde473bae83b4626991a2b5330ecbecb6", @ANYRES16=r4, @ANYBLOB="010000000000fedbdf250c0000000c00038008000200fd7f0000180001801400020076657468305f746f5f626f6e64000000"], 0x38}}, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', r2, &(0x7f0000000300)='./file0\x00', 0x41) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) r6 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0xa0835c, &(0x7f0000000240)={[{@nolazytime}, {@abort}, {@lazytime}, {@inode_readahead_blks}, {@nomblk_io_submit}, {@auto_da_alloc}, {@nouid32}]}, 0x2, 0x47e, &(0x7f0000000c40)="$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") close(r6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) socket$inet_sctp(0x2, 0x1, 0x84) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000005000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000200"/20], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0xe63672f1da3bee76, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m10.156644986s ago: executing program 6 (id=10227): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001ec0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000000)={0x0, 0xffa6, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x1, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0xffffff78, 0x4000001, 0x8, 0x5}}}}, 0x30}, 0x1, 0x0, 0x0, 0x8d0}, 0x20000000) 1m10.048287996s ago: executing program 6 (id=10229): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) syz_clone(0x80080, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x44b, 0x0, 0x0, {0x7a, 0x0, 0x0, 0x0, 0x0, 0x1008}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_USE_IFADDR={0x4}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x34041043}, 0x4004000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x44000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x18, 0x30, 0xb, 0x5, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8890}, 0x4014850) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b7"], 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0a0000000400000006000000ff00000042"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x619, r4}, 0x38) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r5 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000280), 0xff, 0x25e, &(0x7f0000000e80)="$eJzs3U1IHGcYB/BnZndr1aXY9lIo/YBSSiuIvRV6sZcWhCJSSqEtWErppUULVulNe8olh+QYkuApFwm5xeQYvEguCYGcTOLBXAKJ5BDJIQnZsDsr+JVo3HUnZH4/WOfDd97nHWb+74g4GEBh9UXEUESUIqI/IioRkWxu8HH26WtuznUvjUXUaj/cTxrtsu3MxnG9ETEbEV9FxGKaxF/liOmFX1YfLn/32dGpyqdnFn7u7uhJNq2trny/fnrkyPnhL6evXr87ksRQVLecV/slu+wrJxHvHEaxV0RSznsE7Mfof+du1HP/bkR80sh/JdLILt6xyTcWK/HFqecde/zetfc7OVag/Wq1Sv0ZOFsDCieNiGok6UBEZOtpOjCQ/Qx/s9ST/j0x+W//nxNT43/kPVMB7VKNWPn2YteF3m35v1PK8g+8prJfSq38ODp/q76yXsp7QEBHfJAt6s///t9mPg/5h8KRfygu+Yfikn8oLvmH4pJ/KC75h4J42vxjv0275B+KS/6huA6c/xNPDm9QQEdszj8AUCy1rgO9Ndzel5CBXOQ9/wAAAAAAAAAAAAAAAAAAADvNdS+NbXza02N5zxaXT0asfZM13Vm/1Ph/xBFvNr72PEi29Jjsq8KL/fpRix206GzOb1+/dTvf+lc+zLf+zHjE7P8RMVgu77z/kub9d3Bv7/H9yu8tFnhJybbtr3/qbP3tHs/nW394OeJSff4Z3G3+SeO9xnL3+adav34t1v/nUYsdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0DHPAgAA///B2nXP") sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x8040) r6 = memfd_create(&(0x7f0000001180)='\x02A\xbbL\xeb\xbd]\x9c\x9aU\x9c\xcbb\xcc\xfa0\xf5JoeN\x8c\x86\xfa\xb3\x0e&\xfe\xa8NF\x96\t\x01\xceJ\xc3\x8f+\xe8\xa7v\x80\xfaj\xfe\x11\x0e\xed6\x00\x00\x00\x00\x00\x00\f\xd7\xe7\xdb?\xf3\xd9\xa3\xd6a\x1a\xfch}7K\xca\x90KA\x02\xd6\x94\xf0S\xcc\xd0\x14\x8c\xb3!\xa8\xeajy@\xa0\xdc~\xea\xfd\xfb\x12\x88Xa\x16\xcb\xe4\x03\x1e\xac\xf2\xe9\xf10xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400000008000000010000008000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000134900000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/25], 0x48) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x2e, &(0x7f0000000040)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xcd9}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m2.211302523s ago: executing program 2 (id=10285): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000f38ccb0ad04da3a8bae7f27ddbfd917ef76b1a6efa2059d5957e73c69490ccb54800705800ce15dcf2ca3c71f53ec8af7d9419384b7e7217ba01e6a64d512a9d0489218f00863ef0a1552b35f36ec1cc4c6c691f4659a3d49e6e7265a0cba82ad9091242138d01c1f98af3c5c06aa032d2c809c5fd23991660b4f2453030bda80f4fd391903c2dbd6bafbdf270d8793dea17acafb11afb4886940c3bd217fdd186a226b2a229fcd831400ccc41495db2fe84991a63a1de4be5c6e07f78950489f515018666fabe2d3396fa44cf1e", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x1c, &(0x7f0000000240)=@ringbuf={{0x18, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {0x3, 0x3, 0x3, 0xa, 0xa}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x15, 0x0, 0x0, 0x76}}], {{}, {0x5, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x28}}}, &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) 1m2.072547318s ago: executing program 2 (id=10286): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x40000007, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x0, 0x10001, 0xda, 0x4, 0xa, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0x5}}) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x18, 0x7, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000007000000faffffff95"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x9}, 0x94) 1m1.537412522s ago: executing program 2 (id=10288): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x101}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$eJzs3c9vFFUcAPDv7LalpWALMSoepIkxkCgtLWCI8QBXYxr8ES9erLQgoUDT1mjRhJLgxcR4McbEkwfxv1AiV0960YMXT4aEqOFo4prZ7vTnbH8s7Q4wn0+y7My8ebw3LN++t6/vzQRQWgPpH5WIAxExlUT0JfOLaR3RSBxYOO/ePx+fTV9J1Gpv/JVE0jiWnZ803nsbmbsj4ucfk9hfXVvuzNzVi2OTkxPTjf2h2UtTQzNzV49cuDR2fuL8xOWRF0dOnjh+4uTw0Zau69raQ2l1Puj7dPTtb7/+Nxn+7vfRJE7FK40Tl1/HdhmIgfq/SbI2qffkdhdWkGrj/8nyjzjpKLBCbEn2+XVGxJPRF9VY+vD64pPXCq0csKNqSUQNKKlE/ENJZf2A7Lv96u/BlUJ6JUA73D29MACwNv47FsYGo7s+NrD7XhLLh3WSiGhtZG6lPRHx0+3RG+duj96Y3rsz43BAvvnrEfHUsvjvylKSevz3R3f01+O/siL+037BmcZ7evz1FstfPVQs/qF9FuK/O6f9X4r/aBL/7yyL/3dbLH9gafO9nhXx39PqJQEAAAAAAEBp3TodES/kzf+pLM7/iZz5P70RcWobyh9Ytb/29/+VO9tQDJDj7umIl3Pn/1aiujD7t7/a+D3/3vp8gM7k3IXJiaMR8VhEHI7OXen+8DplHPls/1fN0gYa8/+yV1p++r50RuVOx66VecbHZsfu97qBiLvXI57Onf+bLLb/SU77n/48mNpkGfufu3mmWdrG8Q/slNo3EYdy2/+lu1Yk69+fY6jeHxjKegVrPfPR5983K7/V+HeLCbh/afu/e/3470+W369nZutlHJvrqDVLa7X/35W8Wb/lTLZc4cOx2dnp4Yie5NVqenTF8ZGt1xkeRVk8ZPGSxv/hZ9cf/8vr//dExPyqvzv5e+Wa4swT//X+0aw++v9QnDT+x7fU/jfdSOYjcpNGbvb/0Kz8zbX/x+tt/eHGEeN/sODLLEy7Vh7PCdCOvKR21xcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgWViNgTSWVwcbtSGRyM6I2Ix2N3ZfLKzOzz5668f3k8Tas//7+SPem3b2E/yZ7/379sf2TV/rGI2BcRX1R76vuDZ69Mjhd98QAAAAAAAAAAAAAAAAAAAPCA6G2y/j/1Z7Xo2gE7rqPoCgCFyYn/X4qoB9B+2n8oL/EP5SX+obzEP5SX+IfyEv9QXuIfykv8AwAAAADAI2XfwVu/JREx/1JP/ZXqaqR1FlozYKdViq4AUBi3+IHyMvUHyst3fCDZIL27aaaNcjbLnJo6u3FmAAAAAAAAAAAAACBz6ID1/1BW1v9DeVn/D+WVrf8/WHA9gPZr+Tt+0zW9wMNovZX8zcN9E+v/AQAAAAAAAAAAAIBtMTN39eLY5OTEdPs2fm089Cv3nJ6IaHN9so23iii02I1arXat/lE8IPV5yDeyqfCbz9WdHwU7s5Gt9dtcroJ+IAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGv8HwAA//+xpBxA") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=@ipv6_delrule={0x44, 0x21, 0x1, 0x70bd29, 0x25dfdbff, {0xa, 0x20, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x10002}, [@FIB_RULE_POLICY=@FRA_OIFNAME={0x14, 0x11, 'macvlan0\x00'}, @FRA_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) sendmmsg$unix(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x44044}}], 0x2, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$incfs(r0, &(0x7f0000000300)='.log\x00', 0x32800, 0x120) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000001000390423bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="81b0002000000000180012800b00010069703667f3018004000700"], 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4040844) sendto$packet(r1, &(0x7f0000000180)="e8b7", 0x2, 0x40, &(0x7f0000000100)={0x11, 0x86dd, r7, 0x1, 0x0, 0x6, @local}, 0x14) r8 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}, {0xe, 0xfff1}}, [@qdisc_kind_options=@q_etf={{0x8}, {0x1b, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb, 0x5}}}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x9, 0x6, 0x5, 0xa, 0x0, 0x6, 0x6}}, {0x4}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000010) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000400)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f00000004c0)={r10, 0x4ffa, 0x5, [0x1, 0x400, 0x9, 0x80, 0xabe]}, 0x12) r11 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f00000007c0)) r12 = memfd_create(&(0x7f0000000ac0)='\x00\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xb5\xf5\xe8\x18h\xb4\xa71\xa8\x85s\xaf\x8a\xe5\xca\'\xfc>\x98\xaa\x8e\x02\xf6rY\xc4\xecB5\vX\'\xe7\xdd\x9d\x9e_\x00\xa1^Yx\x0eF\x98S\xdf\"\xa4\xc2T\xfa\x9f\xac|\xa0\xc5\x9d\xec\xa3\xe9c`j\xbf\x19\xc5\xc7c\xaer\x10\\BCo\x86\xe8X\x1c\x05E%\xb0\x85\xd0\x1e\xa7\xc9w\xa3D\xad<\xcc\x90`\xa8<1\xa1\x04\x0f\a\r\xe4H\x95\a\x80{\x1eJW\x8b\x93\x05\xa2\x85\x95\xdf\x87\xf6+\x0e\xff\xff\x00\x00\x00\x00\x00\x00\xff\xd6h\x8b\xc5\xb9\x10\xa4\x0e\xff\xfak\xf1{\xb7{', 0x4) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000003, 0x11, r12, 0x0) r13 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r13) ptrace$poke(0x4, r13, &(0x7f00000011c0), 0xfffffffffffffffe) ioctl$EXT4_IOC_MOVE_EXT(r11, 0x8004587d, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x4, 0xfffffffffffffffd, 0x1000000085c, 0x7}) 1m0.943203346s ago: executing program 2 (id=10291): r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000002060101000000000000000000f900030500"], 0x30}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="de06000000000000000000000000000000000000fa1ca111d9c9f6a07b9c52cd29afc9be0c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000100"/28], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1200000005000000040000000200000000000000", @ANYRES32=r2, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32], 0x50) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000003c0), 0x0, 0x2}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r5, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(r5, &(0x7f0000000540)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x7}}, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000100)={0x42, 0x2, 0x2}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000001c0001000000000004086aa42d"], 0x30}}, 0x0) r7 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r8 = socket(0x2, 0x80805, 0x0) setsockopt$inet6_buf(r8, 0x29, 0x2b, &(0x7f00000005c0)="dc4ce88479f3d56080d6ce3c270b1714df085394bea5f4462add3c0c9f235ec19c71cde4ac159287db6e66f3a2336536ecd52f5b911b881ff6c92c19b119e7759e25a00df16b0b08e35b3cf8e6d4ac49530a3d1c2eb1b1ca1297ee3168a166e4249e16d460aa32bc6169bf9d59f385fb5bcebde78f5c199f10038a5554e542a05ce13bb96d1f666a0e7ed3f7de335b32db62cd1825813ae69710db373b4326ff651e66205e7be9cdcf565a48b64c8295d81e6da4abf6a91cb14cdabb38b0182392a00b4ceb3df0aea524c0d89645caa29513279e9d014dc2e0", 0xd9) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x3, @empty, 0x3}], 0x1c) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), r4) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x29, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @printk={@x}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x3, 0x0, 0x0, 0x3, 0x5, 0xfffffffffffffffe, 0x4}, @ldst={0x2, 0x1, 0x0, 0x0, 0xa, 0xfffffffffffffffe, 0x12}, @jmp={0x5, 0x1, 0xd, 0x4, 0xb, 0x40, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xbc, &(0x7f0000000480)=""/188, 0x41100, 0x30, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x5, 0x10, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r11, 0x0, 0xef, 0x61, &(0x7f0000000b00)="a768a05e7163a9cba0d431b42381f213ada7cf84be6044d4454db4b195fd8fc8ab0ee5179588459d5ff94be5403026e3b3ef1d659071a3242ef93db0b4694d1dbcee43cc96efabea351d44ce529b95b9068a449c8ba6b1ed806ed7a6514127932fb78318289f4097472af409b2105d648a23f555d1ddc51480f4b696021422b2e602fe86834e5788f98554a93854d99970f9597c8dcafdbf73b70513c5ffb4d10c14f4be8c4c33a4cc87c18cfe554f50f5eee79608a04c7be622c2d4c78fd40e88e72f1945fde9834954ef0f765811e22805d517f750e421447327acd8d5709581fe62c89a8ae2e6361c1f47e3f94d", &(0x7f00000006c0)=""/97, 0x9, 0x0, 0x8e, 0xda, &(0x7f0000000c00)="9c6c3e57368b122058989af125f6aefe52637cc65c88895d03007011288b170b6dd4949ffd10172106ceb17d0b798b0e4474cbf2a8687fa656a45e26178f7670149cb5e3c03e804bd2ddf28135f02efca90d37547aec9fef429c1b7695fe4aef83c0cfebaa4b15374d71666ea4cd01b988900ad6796a689ff6529ff6b87444389fb74bc2592aa5465127ff1ee55f", &(0x7f0000000cc0)="89857abc2cfe13d8b1f6a7cbf8e7cb09dec1e00f6eaf6fbee07790384b525b3bad0cd1866edf24335ad2f2de44481d17c6d3dff04580fe6f175373ed75101ccf4cc8230661d6d8b54c631054ed19c7be7d2c2feaf24c2b9baed89d291924154b039dde5e9bd0ee1cf63de12c7c440fd905eea4eaa68d2f3319f583a34bd27435f2767e3b878b687c809e5fba2a32067b67f92315437f943bfff547283ea7ed572759aeb9585ee3401735299fe0572e30ab5ed0cda5dd98bb28649c0231de4999ac0a836b253d27b3733b63e4dfbccfd0dac25ad56d004c961220", 0x3, 0x0, 0x3}, 0x50) sendmsg$TIPC_CMD_SET_LINK_PRI(r8, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x30, r10, 0x421, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x200, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4100}, 0x20000000) r12 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r9) sendmsg$NL802154_CMD_SET_CHANNEL(r9, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="01002dbd7000fcdbdf2509000000050008001a00feff0800010001000000050007"], 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x64000) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f00000001c0)={0xa, 0x4e21, 0x80000, @dev={0xfe, 0x80, '\x00', 0x19}, 0x81}, 0x1c, 0x0}, 0xc4) 1m0.700476902s ago: executing program 2 (id=10292): syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f0000000080), 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101642, 0x33) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000005c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x202) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000100)={0x80, 0x1, 'client1\x00', 0xffffffff80000004, "00000000ffffffe3", "e4a18560d99f00", 0x800000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) pwritev2(r1, &(0x7f0000000cc0)=[{&(0x7f0000000240)=';', 0xffffffbc}], 0x1, 0xfff, 0xc, 0x4) 1m0.700349342s ago: executing program 42 (id=10292): syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f0000000080), 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101642, 0x33) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000005c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x202) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000100)={0x80, 0x1, 'client1\x00', 0xffffffff80000004, "00000000ffffffe3", "e4a18560d99f00", 0x800000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) pwritev2(r1, &(0x7f0000000cc0)=[{&(0x7f0000000240)=';', 0xffffffbc}], 0x1, 0xfff, 0xc, 0x4) 46.227857749s ago: executing program 5 (id=10431): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711227"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x49, 0x0, &(0x7f0000000900)="d9e09758eda175284a04c7fa0bf2946a2677f37f5be0ae2b9b0a1b5923e79818d2e59aa7eef595d9795c58288ff2e7e42a486e071cf8cb54263e9841ac134a3ca4dde908689b1d533e", 0x0}, 0x50) 44.413133595s ago: executing program 5 (id=10431): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711227"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x49, 0x0, &(0x7f0000000900)="d9e09758eda175284a04c7fa0bf2946a2677f37f5be0ae2b9b0a1b5923e79818d2e59aa7eef595d9795c58288ff2e7e42a486e071cf8cb54263e9841ac134a3ca4dde908689b1d533e", 0x0}, 0x50) 44.363068496s ago: executing program 5 (id=10451): socket$nl_generic(0x10, 0x3, 0x10) timer_create(0xfffffffd, 0x0, &(0x7f00000011c0)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x80000001, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', 0xa1c406, &(0x7f0000000080)=ANY=[@ANYBLOB="646f7473007ff5ff522c246d6173a594e5e0ee30303030010000000000400017c3d234e02f30303030302c6e6f646f742c6e66733d6e0973", @ANYRES32=0x0, @ANYRES8], 0x1, 0x2a0, &(0x7f0000001400)="$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") r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) connect$inet(r3, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000440)}}], 0x1, 0x4000000) syz_emit_ethernet(0x4f, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x4000000) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='westwood', 0x8) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 42.859634347s ago: executing program 5 (id=10457): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8, &(0x7f00000000c0), 0x2, 0x53a, &(0x7f0000000c80)="$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") socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) 42.632274986s ago: executing program 5 (id=10461): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) unshare(0x60000600) sync() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = fsopen(&(0x7f0000000240)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x900) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, 0x0, 0x20000084) creat(&(0x7f0000000000)='./file0\x00', 0x6b) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket(0x28, 0x5, 0x0) lsetxattr$security_capability(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0), 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r3) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x20000881) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000003c0)={0x20, r4, 0x5, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x4000000) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="2e0000007c49c22a59b62f8bbd44ea30d7e411f8f47b61b5908d3a158ac402eeef537249673ef94e4491106a05505b49cc1faecf6f049d", @ANYRES16=r4, @ANYBLOB="000829bd7000fbdbdf25310000000500360000000000050036000100000008000200", @ANYRES32=r5, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000801) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES8, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00008b4b070001004000000000000000000000000000000002000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000001000000000000600400009509000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0xffffffffffffffff, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) 42.268577261s ago: executing program 5 (id=10466): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), r0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r2, &(0x7f0000000340)={&(0x7f0000000080)={0xa, 0x4e22, 0xfff, @loopback, 0x4}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="23020000000000000000030000000800020005000000140001"], 0x30}, 0x1, 0x0, 0x0, 0x4}, 0xa800) 42.268449741s ago: executing program 43 (id=10466): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), r0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r2, &(0x7f0000000340)={&(0x7f0000000080)={0xa, 0x4e22, 0xfff, @loopback, 0x4}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="23020000000000000000030000000800020005000000140001"], 0x30}, 0x1, 0x0, 0x0, 0x4}, 0xa800) 9.506087632s ago: executing program 9 (id=10822): r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x20000) lseek(r0, 0x3, 0x1) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000001180)=[{0x6, 0x5, 0x5, 0x7ffc0001}]}) r2 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x10, 0x3, 0x23}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_io_uring_submit(r3, r4, 0x0) dup3(r2, r1, 0x80000) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0)={[{@nodioread_nolock}, {@minixdf}, {@norecovery}]}, 0x2, 0x4c5, &(0x7f0000000540)="$eJzs3ctrXNcZAPBvZixZktX60VJsF2qDC+4Da/SgWGq76artwlBq6KYFV5HGiqORRmhGjiW8kJOdF1mEhARCFtnnL8gmXsUEQlZZJPuQRXBIHAWSQGDCvTNjSyONMiSyxtb9/eBa5z5mvnM8fIdzz9w7N4DMOpv8k4sYjoj3I+JoY3XrAWcbfzbu35xJllzU65c/z6XHJeutQ1uvOxIR6xExEBH//nvEU7ntcaura/PT5XJpublerC0sFauraxeuLUzPleZKi2OTF6emJkcnxqf2rK23X3jm9qW3/tn/5tfP37v74jtvJ9Uabu7b3I691Gh6XxzftO1QRPz1UQTrgUKzPYO9rgg/SvL5/SIizqX5fzQK6acJZEG9Xq9/Vz/cafd6HTiw8ukYOJcfiYhGOZ8fGWmM4X8ZQ/lypVr749XKyuJsY6x8LPryV6+VS6PNc4Vj0ZdL1sfS8sP18bb1iYh0DPxSYTBdH5mplGf3t6sD2hxpy/+vCo38BzLCKT9kl/yH7JL/kF3yH7JL/kN2yX/ILvkP2SX/IbvkP2SX/Ifskv+QSf+6dClZ6q3732evr67MV65fmC1V50cWVmZGZirLSyNzlcpces/Owg+9X7lSWRr7U6zcKNZK1Vqxurp2ZaGysli7kt7Xf6XUty+tArpx/Mydj3IRsf7nwXRJ9Df3yVU42Or1XPT6HmSgNwq97oCAnjH1B9nlHB9o/4ne9nHBQKcXLj2cLwSeLPleVwDomfOnfP8HWWX+H7LL/D9klzE+sMMj+rbYbf4feDKZ/4fsGu7w/K+fbXp212hE/DwiPiz0HW496ws4CPKf5prj//NHfzvcvrc/9036FUF/RDz72uVXbkzXastjyfYvHmyvvdrcPr7phR1PGIBeaeVpK48BgOzauH9zprXsZ9zP/ta4CGF7/EPNucmB9DvKoY3clmsVcnt07cL6rYg4uVP8XPN5540TmaGNwrb4J5p/c423SOt7KH1u+v7EP7Up/m82xT/9k/9XIBvuJP3P6E75l09zOh7k39b+Z3iPrp3o3P/lH/R/hQ7935kuYzz9+nOfdIx/K+L0jvFb8QbSWO3xk7qd7zL+vf/951ed9tXfaLzPTvFbklKxtrBUrK6uXUh/R26utDg2eXFqanJ0YnyqmM5RF1sz1dv95eR7d3dr/1CH+Lu1P9n2+y7b/+2v3/3v2V3i/+7czp//iV3iD0bEH7qM/+X4x//vtC+JP9uh/fld4ifbJrqMX335H4e7PBQA2AfV1bX56XK5tKyg8OQUPng8qrE3hVuPRzXaCr3umYBHrbqanJonSd/rmgAAAAAAAAAAAADd2o/LiXvdRgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAg+D7AAAA//+M69Uq") r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc097, 0x2, @perf_config_ext={0x288}, 0xa216, 0x6, 0x11000, 0x4, 0x9484, 0x2001, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x10d2, &(0x7f0000000340)={0x0, 0x6bf6, 0x100, 0x5, 0x12}, &(0x7f00000000c0)=0x0, &(0x7f0000000300)=0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x0, 0x8}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0xd, @empty=0x1000000}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @loopback}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1}) quotactl_fd$Q_SETQUOTA(r5, 0xffffffff80000800, 0x0, &(0x7f0000000140)={0x0, 0x8000000000000000, 0x8000000000043, 0x0, 0x7f, 0x401, 0x28af, 0x2, 0x9853}) 9.410499755s ago: executing program 9 (id=10824): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) 9.341590322s ago: executing program 9 (id=10825): semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0x88d3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x18) close_range(r0, r1, 0x2) r2 = semget(0x2, 0x0, 0x3a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) clock_gettime(0x2, &(0x7f0000004700)) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0x88a, &(0x7f0000000000)={[{@errors_remount}, {@usrjquota, 0x22}, {@errors_continue}, {@noload}, {@sb={'sb', 0x3d, 0x1}}, {@grpjquota, 0x22}, {@grpquota}, {@jqfmt_vfsold}, {@nodiscard}]}, 0xfe, 0x45a, &(0x7f0000000d80)="$eJzs3L1vG2UYAPDHduz0k4RSPlpaCBRExUfSpB90YCkCiQEkJBiKmEKSVqVug5og0aqCwhBGVIkdMSLxF7BQFgRMSKywI6QIZaEwIKOz71InsZM4duJQ/37S1e/re6/v+9zdaz++sxNAzxpK/slF7ImIXyNioFZd2mCo9nB74frE3wvXJ3JRqbzxZ67a7q+F6xNZ02y73bVKpbJKv3NvR4yXy1NX0vrI7KX3RmauXnvuwqXx81Pnpy6PnT594vjh0qmxk+0F2F972JuM9eCH04cOvPLWzdcmzt5858evk/HuSZvVx9EpQ7W929CTne6sy/bWlXN9XRwILSlERHK4itX5PxCF2Lm4biBe/qSrgwM2VaWSr/zbfPWNCnAXSxL1tZWqrxXA3SR7o08+/2bLFqUe28L8mVi8jnE7XWpr+iKftimmn5E2w1BEnL3xzxfJEpt0HQIAoN6tMxHxbKP8Lx8P1LW7J703NBgR90bEvoi4LyL2R8T9EdW2D0bEQy32v/wOycr8pzKwocDWKcn/XkjvbS3N/7LsLwYLaW1vNf5i7tyF8tSxdJ8cjWJ/Uh9dpY/vXvrls2br6vO/ZEn6z3LBdBx/9PUv3WZyfHa8nZjrzX8ccbCvUfy5xZw3yY8PRMTBDfZx4emvDjVbt3b8q+hAUl75MuKp2vG/Ecviz+Sa3p8cff7U2MmRHVGeOjaSnRUr/fTz3OvN+m8r/g6Yv1WJXQ3P/8X4B3M7ImauXrtYvV8703ofc7992vQzzUbP/1LuzWq5lD73wfjs7JXRiFLu1ZXPj93ZNqtn7ZPz/+iRxvN/X9zZEw9HRHISH46IRyLi0XTsj0XE4xFxZJX4f3jxiXdbj79/lf+xc5L4J9c6/lF//FsvFC5+/03r8WeS43+iWjqaPrOe17/1DrCdfQcAAAD/F/nqd+Bz+eHFcj4/PFz7Dv/+2JUvT8/MPnNu+v3Lk7Xvyg9GMZ9d6Rqoux46ml4bzupjy+rH0+vGnxd2VuvDE9PlyW4HDz1ud5P5n/i90O3RAZvO77Wgd5n/0LvMf+hd5j/0LvMfelej+f9RF8YBbL013v93btU4gK0n/4feZf5D7zL/oSc1/W18vq2f/Ct0qfBtqb2/1bD+QuQ3uvmO9NzbHnts+xSK0XBV32bvqP6Gq7r8wgQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANAh/wUAAP//hQ/crg==") semtimedop(r2, &(0x7f0000000000)=[{0x173e7c6934551656, 0x5, 0x1000}], 0x1, &(0x7f0000000040)) 9.144566777s ago: executing program 9 (id=10828): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x75c60c2b, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x5}, 0x106200, 0x10006, 0x20da, 0x5, 0x9, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000200)={0x1d, r2}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@getchain={0x24, 0x11, 0x839, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r2, {0x1, 0xa}, {0xffff, 0x10}}}, 0x24}, 0x1, 0x0, 0x0, 0x8880}, 0x80) 8.834327572s ago: executing program 9 (id=10833): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x3a84821, 0x0) semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0x88d3}, {0x0, 0x7, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x989680}) 7.461845646s ago: executing program 9 (id=10842): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/power/freeze_filesystems', 0x101, 0x11) write$tcp_mem(r0, &(0x7f00000000c0)={0xfffffffffffff1a6, 0x20, 0x0, 0x20, 0xfffffffffffffffd}, 0x48) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xfb) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newqdisc={0x48, 0x24, 0x3fe3aa0262d8c583, 0x2, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x0, 0x10}, {0xffff, 0x8}, {0x2}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x1c, 0x2, [@TCA_HHF_HH_FLOWS_LIMIT={0x8, 0x3, 0x6}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x8000009}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x5}]}}]}, 0x48}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001340)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c0000001800010d00000000000000850a200100000000000500000014000500200100000000000000000100000000001c000900"], 0x4c}}, 0x40000) r2 = syz_open_dev$sg(&(0x7f00000004c0), 0x40000000006, 0x2000) ioctl$SG_BLKSECTGET(r2, 0x1267, &(0x7f0000000540)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000006000000ffff00006d4f000020000000", @ANYRES32, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000050000000200"/28], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f0000000000)="8507312225390c0aff345461378d1214fa8c39b1e2a2d9f65d5e9bdbabf3b820842f73d502a213f175789ad57b26249e798cc36b7ad8d4d4e32630f0d9d543153070aa48", &(0x7f0000000080)=""/89, &(0x7f0000000100)="22165777cf4e3c046cb4f923e8bafb130cefab0509758031346d227062cc125f4080f8bb6b57bc03a8762ff7c553ac55b3647aaf8a3828c9b3d973293d67dc19157585efd495e7c1e585cdaf0aa3f3ac0e6912ad063266901762c7e21e54ddd557065e2b7cbd70146014e16c4078fd5e1bca474de56b5b54c1c3c0ff357626e1340116ec1f1f5712a607d6203a1cf9adac518c7a616df95b20aa80a2c3a1183a8a7145af756bec5832f6", &(0x7f00000001c0)="bffbbf8a1fdd5e5b793d732a75831ec7cd79630b7e03da10a72ffe5aadd1499f1595c941016283c0d1cc50325d530cc1d3cfa5d810a64bc933ffa459505a1cb34a9a4fdeee8a544edb87421f7a0c5f6e72c1ce3c95451c5dec84bb370fefa174714b3c0d8dade6b5f3b4a6140e4e9082bd32c80b9a4c279755358f27e4a30e3cf14b30e5078164f69276b7229793aca55efb527a7de9b209533c500c32a470724094ce18c1ed4faf9beaa3a37d494a4be7cad044bfb5e2e326f6e0e82df389c4ccdb41c7", 0x1e, r3, 0x4}, 0x38) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000800)=@mangle={'mangle\x00', 0x1f, 0x6, 0x608, 0x3f8, 0x3f8, 0x3f8, 0x0, 0xf8, 0x538, 0x538, 0x538, 0x538, 0x538, 0x6, &(0x7f0000000400), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@remote, @loopback, [0xffffffff, 0x0, 0xffffffff, 0xffffff00], [0xff000000, 0xff, 0x0, 0xffffffff], 'ip6gre0\x00', 'ip6gre0\x00', {}, {0xff}, 0x5e, 0x5, 0x0, 0x20}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv6=@mcast2, 0x1f, 0x10, 0xfc}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@local, @ipv6=@mcast2, 0x4, 0x10, 0xfffa}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x2}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x8}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast1, @ipv4=@rand_addr=0x64010101, 0x1d, 0x27, 0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x668) 2.607597306s ago: executing program 1 (id=10891): setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x1029, &(0x7f00000003c0)={0x0, 0x907d, 0x1000, 0x3, 0x80000000}, &(0x7f0000000000), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_NAPI(r0, 0x1b, &(0x7f0000001cc0)={0x4, 0x6}, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/power/image_size', 0x129a82, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x3, 0x1000}, 0x4) socket$kcm(0x10, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_KEY(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000327c76f66447e16b153deecde34bfcc54de6d209ada9b901893430c98562ca9f4bcd7f304ca9188f2a688ee79efcd612408af834423cd900df87285da62586e2e5441317c7", @ANYRES16=0x0, @ANYBLOB="00012abd7000fddbdf250a000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000000000d07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) r7 = io_uring_setup(0x7a82, &(0x7f00000001c0)={0x0, 0xd3ba, 0x40, 0x0, 0x33e}) io_uring_register$IORING_REGISTER_MEM_REGION(r7, 0x22, &(0x7f0000000300)={&(0x7f00000000c0)={&(0x7f0000000240)="eeac32", 0x3, 0x1, 0xe, 0x4}}, 0x1) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0x4}, {0xffff, 0xffff}, {0xb, 0xfff3}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0xf, 0x5, 0xfffffff9}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002580)=@newtfilter={0x2ac, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, {0x3}, {}, {0x4, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x280, 0x2, [@TCA_U32_CLASSID={0x8, 0x1, {0x0, 0x4}}, @TCA_U32_SEL={0x274, 0x5, {0x4b, 0x8, 0x9, 0x0, 0x0, 0xefdf, 0x2, 0x84c, [{0x0, 0x8000, 0x1, 0x32ec}, {0x4, 0x2, 0xc5f5, 0x7fffffff}, {0x9, 0x8001, 0x7, 0x1c00}, {0x0, 0xffffffe1, 0xd, 0x6}, {0x9, 0x0, 0x80000001, 0x4}, {0x8, 0xa48e, 0x7d39876a, 0x7}, {0x2, 0x100, 0x6, 0x8}, {0xffff, 0x7, 0x2, 0x9}, {0x3, 0x8, 0x5c, 0x1004}, {0xfffffff8, 0x3, 0x4, 0x3}, {0xffffffff, 0x6, 0x80, 0x4}, {0x4, 0x2, 0x4, 0xa}, {0x2, 0x0, 0xf53, 0x8}, {0xc, 0xe, 0x7, 0xc793}, {0x4, 0x101, 0xe0ed, 0x3}, {0xe, 0x9, 0xbb, 0x8}, {0x80, 0xa0, 0x1b09, 0x5}, {0x6, 0x7, 0x7ff, 0x9}, {0x8, 0xb38, 0x1, 0x8}, {0x400, 0x5b, 0x8}, {0x2, 0x7, 0x0, 0x4}, {0xc8f, 0x7}, {0xfffffff0, 0x80000001, 0x1, 0x6}, {0x2, 0x2, 0x10, 0x880}, {0x20, 0xf0, 0x3134, 0x8}, {0x6422, 0x6, 0x0, 0x4}, {0x8, 0xb56, 0x1003}, {0x1, 0xea81aae, 0xff, 0x2}, {0x6, 0x4, 0x4d, 0x653}, {0x2, 0xe7, 0x401, 0xd}, {0x0, 0xffffff50, 0xfffffff9, 0x2}, {0x0, 0x5, 0x464, 0x7fffffff}, {0x1ff, 0x0, 0x5, 0x5}, {0x3ca7, 0x3, 0x2, 0x4}, {0x1, 0x350f, 0x4, 0x5}, {0x1431, 0x10000, 0x52d, 0xfff}, {0x3, 0x9, 0x58b, 0x8000}, {0x101, 0x7, 0x1, 0xffffffff}]}}]}}]}, 0x2ac}}, 0x24040084) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x10, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="0b000000000000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000bb"], 0x190) syz_emit_ethernet(0x66, &(0x7f0000000640)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x5dc, {0x0, 0x6, "8cb02b", 0xfffd, 0x2f, 0x1, @loopback={0x4000000}, @empty}}}}}}}, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1802008eecabcc000e00000000003d08000095000000f2000000000000"], &(0x7f00000000c0)='GPL\x00', 0x1}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r9, 0xffffffffffffffff, 0x7, 0x0, @val=@tcx={@void, @value=r9}}, 0x1c) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="86565e31c08f301a5873430d173a5f56a460c903fc2607c6b03a4ceab1839336079e693783cf3b6d3cfcdf4fbc8516f9066e79bfa3f2880e37c633d9941439690abd00d99cc7e552c3fba5f3014838ec3461ca4f842ee9a7374ff789f2595260b31af5426e97d1003da9ebc0142c3f5cf666ff78e52e0d61ea89f2a16e8715cd58ec965cc063aa45e826cfa8b6d6a217cd2cc6cf04ddd6d4a928db48", @ANYRES64], 0xa24a) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r10, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x4011871, 0xffffffffffffffff, 0x2000) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) mremap(&(0x7f00007ff000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000580000/0x4000)=nil) 2.353706231s ago: executing program 1 (id=10894): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c0100001000130700000000fcdbdf25e0000001000000000000000000000000ff020000000000000000000000000001000400004e2100020000000021000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="fc010000000000000000000000000000000004d632"], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2014) (async, rerun: 32) r0 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7734, 0x80, 0x0, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) (rerun: 32) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) (async, rerun: 64) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async, rerun: 64) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x1}) (async) io_uring_enter(r0, 0x47bd, 0x1, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) io_setup(0x7, &(0x7f0000001e00)=0x0) (async) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4e, &(0x7f00000000c0)=0x8, 0x4) (async) r7 = dup(r6) bind$unix(r7, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00', 0x0}) (async, rerun: 64) r11 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setreuid(0xee01, 0xee01) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) (async, rerun: 32) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f00000001c0)=0x10) (async, rerun: 32) mkdirat(r11, &(0x7f0000002040)='./file0\x00', 0x5) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1b, 0x5, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3e}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000340)='GPL\x00', 0x4ee, 0x5a, &(0x7f0000000380)=""/90, 0x41000, 0x4, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x18, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff0000}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @map_val={0x18, 0x1, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}, @jmp={0x5, 0x0, 0x7, 0x7, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0xa7786cc92d966add, 0x1, 0x3, 0xffffffffffffffff, 0xfffffffffffffffc}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x3, 0xbf, &(0x7f0000000180)=""/191, 0x41100, 0x14, '\x00', r10, 0x0, r11, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x2, 0x5, 0x9}, 0x10, 0x40ff, r12, 0x4, 0x0, &(0x7f0000000540)=[{0x2, 0x5, 0xf, 0xa}, {0x1, 0x2, 0x7, 0x7}, {0x4, 0x1, 0x8, 0x4}, {0x3, 0x3, 0xb, 0x5}], 0x10, 0x8}, 0x94) (async) io_submit(r5, 0x1, &(0x7f0000000640)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x82, r3, 0x0}]) (async) shutdown(r4, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x3000004, 0x110, 0xffffffffffffffff, 0xfc2e2000) 2.051920707s ago: executing program 1 (id=10896): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000fc0)="985e44efeabe001cabcf3d867300000000a2d3197970cb347b70a243bf77139a94bcda6b1a0ea305f3bf3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9207fd8048f04ad6c42200fd92322fc06a361816bf21afb8473a064f1988536d4b040000003aaafaf59f53121782a0a9370dc0feae13c8c2a1dbc8a3122aaa3dcd5b9247a915378e6492e5b94073dcdc87e7c794", 0xc5}], 0x1}}], 0x1, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 2.051615147s ago: executing program 7 (id=10897): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) sendmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)="ec7725c8b644b9", 0x7}], 0x1, 0x0, 0x0, 0x40000}, 0x20004011) recvmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x5, 0x8, 0x20005, 0x7, 0x0, 0x0, 0x0, 0x20004006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000280)={0x0, 0xdeef5fff, 0x1000, 0xe, 0x1}, 0x20) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e0300000000000000000000000000000504000000000000000000000b04000000000000000000000a020000000000000061"], 0x0, 0x52}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) 1.944444378s ago: executing program 8 (id=10898): r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x20000) lseek(r0, 0x3, 0x1) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000001180)=[{0x6, 0x5, 0x5, 0x7ffc0001}]}) r2 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x10, 0x3, 0x23}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_io_uring_submit(r3, r4, 0x0) dup3(r2, r1, 0x80000) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0)={[{@nodioread_nolock}, {@minixdf}, {@norecovery}]}, 0x2, 0x4c5, &(0x7f0000000540)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc097, 0x2, @perf_config_ext={0x288}, 0xa216, 0x6, 0x11000, 0x4, 0x9484, 0x2001, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x10d2, &(0x7f0000000340)={0x0, 0x6bf6, 0x100, 0x5, 0x12}, &(0x7f00000000c0), &(0x7f0000000300)) socket$nl_route(0x10, 0x3, 0x0) quotactl_fd$Q_SETQUOTA(r5, 0xffffffff80000800, 0x0, &(0x7f0000000140)={0x0, 0x8000000000000000, 0x8000000000043, 0x0, 0x7f, 0x401, 0x28af, 0x2, 0x9853}) 1.312688195s ago: executing program 8 (id=10902): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8b7a515e7a9aa37c}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x5, 0x84}}}, 0x6c}}, 0x0) 1.312258894s ago: executing program 0 (id=10903): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8b7a515e7a9aa37c}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x5, 0x84}}}, 0x6c}}, 0x0) (fail_nth: 2) 1.246016363s ago: executing program 8 (id=10904): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x8, 0x7}, 0x0, 0x0, 0x0, 0x7, 0x8, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) semget$private(0x0, 0x4000000009, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f00000002c0)={0x3, 0x1, @status={[0x3, 0x5, 0x1, 0xfa, 0x7, 0x9]}, [0xa, 0x670, 0x80000000, 0x80000001, 0x7f, 0x3, 0x10, 0x4, 0x6, 0x9, 0x0, 0x1, 0x7, 0x1b40000000000, 0xc8e, 0x5, 0xd7, 0x7, 0x2, 0x4, 0x3, 0x6, 0x40, 0xa00b, 0x10000, 0x0, 0x3, 0x80000000, 0x2, 0xc, 0x43, 0x80, 0xc874, 0xffffffffffffffff, 0x7, 0x6, 0x7, 0x7, 0x6, 0x0, 0x8, 0x3, 0x7fffffffffffffff, 0x1000, 0x800, 0xfffffffffffffffa, 0x7ff, 0x22f0, 0x3d, 0x9, 0xfff, 0x4, 0x40, 0x9, 0x81, 0xe8, 0x9, 0x1, 0x7, 0x3ff, 0x9, 0x1, 0x2, 0x7]}) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x102802, 0x0, 0x0, 0x3, 0x1000, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x686, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x4, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x8, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) (fail_nth: 2) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='veth1_to_team\x00', 0x6f) sendto$inet(r1, 0x0, 0x0, 0x804, &(0x7f0000000080)={0x2, 0x4e26, @multicast1}, 0x10) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc67}, 0x8a}], 0x4, 0x2, 0x0) 974.999174ms ago: executing program 7 (id=10905): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r0 = syz_io_uring_setup(0x10d4, &(0x7f0000000000)={0x0, 0x615e, 0x8, 0x200000, 0x1200034f}, &(0x7f00000000c0)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{0x32, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) io_uring_enter(r0, 0x200047bd, 0x1000000, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x124, 0x40000000000004, 0x0, 0x0, 0x7}, 0x0, 0xfff0000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r5 = io_uring_setup(0x5bd7, &(0x7f00000004c0)={0x0, 0x89f1, 0x100, 0x2, 0x20002f7}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1900000004000000040000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000010000000001000000007a40e3500ff3c787087c006d86e044"], 0x50) io_uring_enter(r5, 0x2219, 0x698e, 0x16, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540020900020073797a310007000008000a40fffffffc14000000110001000000896b96a9109c38fbbe08b7d68131d6bcf4243e7a9f7b17177fbaea4230615536ac3e09739d58d3e2fc515b63fef80005334f9ac99e3bc17d0fd6311d841e9e085710cd3ce3432c1fb84b1a76c2668711f3af5785ebb76f2fc510aca2ad1142f0022df66f45afae653c591b6397dfa8119e766e504ba00d3a5900e004c1d927b3ebd2944360956eed9afcd5064745e2b86a9f49", @ANYBLOB="2bc5ecdc958c4d1132a3be184d198d043a6ec9b43b19d084569949c283a5a7b031f0d150812251eb84729d648d91f48be8b009332a37ff4b11c59509b3bdb99d2bde3ff0034e6d9dddc0a0018191f81a0440291bc527fb6b1d18a6798a2f0cc22783c7fe023d388f3f2fc7cd4c6ffdff3abf19e85840244bc1dc40605091807f79ff810d06a02488e5d06ef0dc7adb0a80ca680c2029ee1862ac374aa76e0eab8eb1c5a8c8d1ee337612bc4c19cc", @ANYRES16, @ANYRESOCT=r3], 0x64}, 0x1, 0x0, 0x0, 0x2004094}, 0x24000000) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x98}, 0x1, 0x0, 0x0, 0x4044050}, 0x40) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x0, 0x10, '\x00', r7, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x94) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000000c0)={'macvtap0\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000080)={@remote, r9}, 0x14) setsockopt$inet6_mreq(r8, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x38b000, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000100)=@int=0x8, 0x4) 974.698984ms ago: executing program 1 (id=10906): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x80}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x5, 0x84}}}, 0x6c}}, 0x0) 958.736311ms ago: executing program 0 (id=10907): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x80}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x5, 0x84}}}, 0x6c}}, 0x0) (fail_nth: 2) 957.935921ms ago: executing program 1 (id=10908): setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x8008000000010, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'veth1\x00'}) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x20000007d, 0x0) r3 = dup3(r1, r2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MON_IOCG_STATS(r3, 0xc0109207, &(0x7f00000001c0)) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)={0x0, 0x2, [0x682, 0xb37, 0xf2b, 0xfe9]}) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400000008000000010000008000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000134900000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/25], 0x48) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x2e, &(0x7f0000000040)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xcd9}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 747.734083ms ago: executing program 0 (id=10909): openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x16, 0x1, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x400}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f0000000140)={[{@grpquota}, {@init_itable_val={'init_itable', 0x3d, 0x9}}, {@bsdgroups}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") r3 = syz_open_dev$vcsu(0x0, 0xfffffffffffffff9, 0x200481) sendmsg$IPSET_CMD_PROTOCOL(r3, 0x0, 0x4000001) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) write$cgroup_int(r3, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r6 = socket(0x10, 0x803, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=@delqdisc={0x9c, 0x25, 0x400, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x5, 0xb}, {0xfff3, 0x7}, {0xb, 0xa}}, [@TCA_RATE={0x6, 0x5, {0x1, 0x81}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}, @qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x3}}, @qdisc_kind_options=@q_fq={{0x7}, {0x34, 0x2, [@TCA_FQ_TIMER_SLACK={0x8, 0xd, 0x40}, @TCA_FQ_LOW_RATE_THRESHOLD={0x8}, @TCA_FQ_PLIMIT={0x8, 0x1, 0x6}, @TCA_FQ_PLIMIT={0x8, 0x1, 0x1}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_LOW_RATE_THRESHOLD={0x8, 0xb, 0x4480}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7fff}, @TCA_RATE={0x6, 0x5, {0x8, 0x3}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000041}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000840)=@newtfilter={0x54, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0x3}, {}, {0x4, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x28, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0xc, 0x6, 0x1, 0x3d3f, 0x0, 0xfff, 0x3, 0x58f, [{0xebd, 0x1, 0x206, 0x7}]}}]}}]}, 0x54}}, 0x24040084) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="01000000000000000000290000001800018014000200626f6e645f736c6176655f30"], 0x2c}}, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000300)='task\x00') getdents64(r11, &(0x7f0000000000)=""/36, 0x24) getdents(r11, 0xffffffffffffffff, 0x7a) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x14, &(0x7f0000000240), 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r12, 0x0, 0x0) 615.45779ms ago: executing program 7 (id=10910): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0xffffffff, 0x3}, {0x0}, &(0x7f00000002c0)=[{&(0x7f0000001a00)=""/4097, 0x1001}], 0x1, 0x0, 0x4}}], 0x48, 0x48004}, 0x0) (fail_nth: 2) 615.31035ms ago: executing program 8 (id=10911): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0xffffffff, 0x3}, {0x0}, &(0x7f00000002c0)=[{&(0x7f0000001a00)=""/4097, 0x1001}], 0x1, 0x0, 0x4}}], 0x48, 0x48004}, 0x0) 402.402062ms ago: executing program 7 (id=10912): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x70, 0x2, 0x6, 0x5, 0x0, 0x0, {0xa}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x70}}, 0x0) 386.045509ms ago: executing program 8 (id=10913): r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x20000) lseek(r0, 0x3, 0x1) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000001180)=[{0x6, 0x5, 0x5, 0x7ffc0001}]}) r2 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x10, 0x3, 0x23}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_io_uring_submit(r3, r4, 0x0) dup3(r2, r1, 0x80000) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0)={[{@nodioread_nolock}, {@minixdf}, {@norecovery}]}, 0x2, 0x4c5, &(0x7f0000000540)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc097, 0x2, @perf_config_ext={0x288}, 0xa216, 0x6, 0x11000, 0x4, 0x9484, 0x2001, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_setup(0x10d2, &(0x7f0000000340)={0x0, 0x6bf6, 0x100, 0x5, 0x12}, &(0x7f00000000c0), &(0x7f0000000300)) quotactl_fd$Q_SETQUOTA(r5, 0xffffffff80000800, 0x0, &(0x7f0000000140)={0x0, 0x8000000000000000, 0x8000000000043, 0x0, 0x7f, 0x401, 0x28af, 0x2, 0x9853}) 368.642096ms ago: executing program 7 (id=10914): set_mempolicy(0x1, &(0x7f0000000e80)=0x1ff, 0x7582) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x80, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x1, 0xffffffffffffffff, 0x1) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/45, 0x2d, 0x12000, &(0x7f0000000100), 0x12) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) fspick(0xffffffffffffffff, 0x0, 0xf0961890b4faa8d0) setuid(0xee00) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vga_arbiter(r0, &(0x7f0000000100)=@target={'target ', {'PCI:', '0', ':', '18', ':', '1b', '.', '2'}}, 0x15) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={0x0}}, 0x0) set_mempolicy(0x4000, &(0x7f0000000200)=0x7, 0x2) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYRES64, @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000ffffffff180800002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000400008500000004000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0x4044000}, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r7, 0x10f, 0x86) sendmsg$nl_route_sched(r5, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x400, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x3548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x0, 0x2, 0x0, 0x4}}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=@newtfilter={0x6c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {0xc}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x3c, 0x2, [@TCA_BASIC_EMATCHES={0x38, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1, 0x0, 0x0, {{}, {0x0, 0x0, 0x1}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x4}, [@TCA_EM_META_HDR={0xc, 0x1, {{}, {0x2f}}}]}}]}]}]}}]}, 0x6c}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) syz_clone(0xc30e3400, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 284.91629ms ago: executing program 0 (id=10915): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x3c) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20) poll(0x0, 0x0, 0x7) (fail_nth: 1) 52.961589ms ago: executing program 0 (id=10916): r0 = socket$nl_route(0x10, 0x3, 0x0) quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) (async, rerun: 64) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x275a, 0x0) r2 = socket$kcm(0x2, 0x3, 0x106) (async, rerun: 32) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 32) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}, {0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_TYPE={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x98}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) (async) sendmsg$inet(r2, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000080)="b813651f7f294c6421dd56289c1ab300e40726b3eee760f1159bff9c210685f29a862fd0", 0x24}], 0x1}, 0x0) (async, rerun: 64) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@nogrpid}, {@nombcache}]}, 0x1, 0x45c, &(0x7f00000015c0)="$eJzs28tvG0UYAPBv7aSlL2Kq8ugDCBREBTRp0lJ64AICiQNISHAox5CkVanboCZINIpo4FCOqBI3DogjEn8BJ7gg4ITEFe6oUoUipBZORmvvJrZrO486sYh/P2nbmd1xZz7Pjnd2pxtA3xpO/0gi9kbE7xExVMs2FhiuJe8sLUz+s7QwmUSl8vZfSbXc7aWFybxo/rk9eabUvt7Zq/MXJ8rl6StZfnTu0gejs1fnj1+4NHF++vz05fEzZ06dHHvx9PgLXYkzjev2oY9njhx8/d0bb06evfHez98mK6E1xNElw50OPl2pdLm63tpXl04GetgQ1qUYEWl3DVbH/1AUY6XzhuK1T3vaOGBTVSqVykPtDy9WgG0siXV+4NomNQTYYvmFPr3/zbb80r8Fs4/eu/Vy7QYojf1OttWODEQhKzPYdH/bTcMRcXbx36/SLdb7HKKwSY0CALa179P5z/MN879s/lGI+udC92drKKWIeCAi9kfE6Yg4EBEPRlTLPhwRj7SqJGlff/Miyd3zn8LNDQe3Bun876Vsbatx/rc8uSoVs9y+avyDybkL5ekT2XdyLAZ3pvmxDnX88Opvn7c7Vj//S7e0/nwumLXj5sDOxs9MTcxN3EvM9W59EnFooFX8yfJKQNp9ByPi0AbruPDsN0fy9OFi47HV4++gC+tMla8jnqn1/2I0xZ9LOq9Pjt4X5ekTo/lZcbdffr3+Vrv67yn+Lkj7f3fL8385/lJSv147u/46rv/xWdt7mo2e/zuSdxr2fTQxN3dlLGJH8kat0fX7x5vKja+UT+M/drT1+N8fK9/E4fT8L0Q8GhGPRcTjWdufiIgnI+Joh/h/euWp9zvG/3e7+Hd2+Fe7I41/qqH/8x++dv2/ktgRzXtaJ4oXf/yuodJSU/yr9v+paupYtmctv39radfGzmYAAAD4/0lv9vdGUhhZThcKIyO1/8N/IHYXyjOzc8+dm/nw8lTtHYFSDBbyJ11Ddc9Dx7Lb+jw/3pQ/mT03/qK4q5ofmZwpT/U6eOhze9qM/9SfxV63Dth03teC/mX8Q9+qfw8A6DPtrv/Hv9zihgBbrsX439W8Y6j2l4kCbDOtrv/XetAOYOs1jX/LftBHPP+H/mX8Q/8y/qEvze6K1V+Sl5CoTyQRMR+FXjdDYjMTvf5lAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6I7/AgAA///vJumG") (async, rerun: 64) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000000)={0x8, 0x9}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file2\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000018005805000426bd7000fcdbdf251d01010066a08ff2"], 0x14}, 0x1, 0xba01}, 0x8810) 48.706938ms ago: executing program 7 (id=10917): r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001900)=ANY=[@ANYBLOB="300000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="150200000000000008000d000200000008000500", @ANYRES32, @ANYBLOB="9c0ae15ac67a5d1ee2c09720ce8ed950373ec3afa64f2721580a7e732461d4ae91179e0ed8df44f2da460a9c17930f9791cc2900000000332d246edbe2581384b47c24f3558e4763c0d87b0000000000005396a4bd31102db835f807820918609470d4cfe59ad1e2de10e6ef8d740c"], 0x30}, 0x1, 0xba01}, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) syz_emit_ethernet(0x57, &(0x7f0000002e40)=ANY=[], 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0x42, 0x4, 0x300, 0xffffffff, 0x120, 0x120, 0x1b8, 0xffffffff, 0xffffffff, 0x2b0, 0x2b0, 0x2b0, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_batadv\x00', 'wlan0\x00', {}, {}, 0x11, 0x0, 0x8}, 0x0, 0xf0, 0x120, 0x0, {0x100000000000000}, [@common=@inet=@multiport={{0x50}, {0x0, 0x7, [0x4e22, 0x4e22, 0x4e20, 0x4e22, 0x4e22, 0x4e20, 0x4e21, 0x4e22, 0x4e24, 0x4e23, 0x4e23, 0x4e20, 0x4e22, 0x4e23, 0x4e20], [0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0xfe, 0x1, 0x0, 0x0, 0x1], 0x1}}, @common=@unspec=@connmark={{0x30}, {0x5}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x6, 0x5, 0x5, 0x2}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@multicast2, @private=0xa010101, 0x0, 0x0, 'veth1_virt_wifi\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) accept4$tipc(r2, 0x0, 0x0, 0x800) sendmsg$tipc(r2, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r4 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c000000030703000000000000000000000000040c00078008000240000005040c0006400000000000f5ffff0b0002400000000000000fff140007800800014000000001a8ff024000000005"], 0x4c}, 0x1, 0x0, 0x0, 0xc1}, 0x0) r5 = socket$pppl2tp(0x18, 0x1, 0x1) recvfrom$inet_nvme(r4, &(0x7f0000001680)=""/224, 0xe0, 0x160, &(0x7f0000001800)=@in6={0xa, 0x4e22, 0x100, @private2, 0x2}, 0x80) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000200)={'hsr0\x00'}) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000300), &(0x7f00000017c0)=0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000001780)={'syztnl0\x00', &(0x7f0000001880)={'tunl0\x00', 0x0, 0x20, 0x10, 0x804, 0x8000008, {{0x5, 0x4, 0x0, 0x1, 0x14, 0x0, 0x27, 0x7, 0x29, 0x0, @rand_addr=0x64010100, @multicast2}}}}) r6 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x12, 0x4, @tid=r6}, &(0x7f0000000380)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) r8 = fcntl$getown(r2, 0x9) syz_clone3(&(0x7f0000000500)={0x9a0000, &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380), {0x37}, &(0x7f0000000680)=""/4096, 0x1000, &(0x7f00000003c0)=""/109, &(0x7f00000004c0)=[r6, r7, r8], 0x3}, 0x58) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) r10 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r10, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r10, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x20008864}, 0x800) ioctl$KDDELIO(r9, 0x4b35, 0xf) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a44000000090a010400000000000000000300000008000a40fffffffd0900d69200007a31000000000900010073797a3000000000080005400000001f0800044000000080140000001000010000000000000000000584000a"], 0x6c}}, 0x0) 45.122458ms ago: executing program 1 (id=10918): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r2 = fsopen(&(0x7f0000000c00)='bdev\x00', 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000000)={0x50000008}) fsetxattr$security_ima(r1, &(0x7f0000000080), &(0x7f0000000100)=@ng={0x4, 0xf, "d567be3b6705f205eb927cc5574d"}, 0x10, 0x1) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xffffff22) sendmsg$rds(r4, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0xffffffff, 0x3}, {0x0}, &(0x7f00000002c0)=[{&(0x7f0000001a00)=""/4097, 0x1001}], 0x1, 0x0, 0x4}}], 0x48, 0x48004}, 0x0) 719.99µs ago: executing program 0 (id=10919): r0 = io_uring_setup(0x3450, &(0x7f00000001c0)={0x0, 0x4d9d, 0x20000, 0x1}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x840000000002, 0x3, 0xff) sendmsg$inet(r2, &(0x7f0000000900)={&(0x7f00000006c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000000)="b74501000000000001008cc5595c4a9b8f52ac8e5c7fe70a3326491f", 0x1c}], 0x10, &(0x7f00000008c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x33}, @empty}}}], 0x20}, 0x400c804) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, &(0x7f0000000140)={0x2, {0xa, 0x3, 0x100, 0xffffffff, 0x7}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x4e22, 0x9, @loopback, 0x6}, 0x1c) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000040)=0x40, 0x4) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e22, 0x56202329, @empty, 0x4000005}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="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", 0x23f}], 0x1}}], 0x1, 0x4000001) r6 = dup(r5) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r6) sendto$inet6(r5, 0x0, 0x0, 0x48c00, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000040000000000000090000008500000011000000850000000700000095"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(r7) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a3200000000140000001100"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r8, 0x0, 0x40) sendmsg$NFT_BATCH(r7, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c00018006000100d1070000080003400000000114"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000006680)=ANY=[@ANYBLOB="140000001000010000000400000000000500000a400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d1030000144000001100010000000000000000000100000a"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="245900004b0fab3377891cd302924f6df83c0fe48023198c", @ANYRES16=r3, @ANYBLOB="0100000000000800000003000000100001800a00010069623a6c6f000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000004) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x0, 0x1}, 0x20) 0s ago: executing program 8 (id=10920): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="700000000206050000000000000000000a000000120003006269746d61703a69702c6d616300000005000400000000000900020073797a3100000000240007801800018014000240fe8000000000000000000000a000000008000840000000000500050002000000050001000600004d"], 0x70}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r1) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000340)={0x20, r2, 0x421, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x84098}, 0x840) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) kernel console output (not intermixed with test programs): 3910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1386.456554][T13910] R13: 00007f2072d36038 R14: 00007f2072d35fa0 R15: 00007fffa7f2a208 [ 1386.456572][T13910] [ 1386.761342][T13933] tipc: Failed to obtain node identity [ 1386.767646][T13933] tipc: Enabling of bearer rejected, failed to enable media [ 1387.011879][T13962] xt_hashlimit: max too large, truncated to 1048576 [ 1387.025495][T13962] No such timeout policy "syz1" [ 1387.031721][T13965] lo speed is unknown, defaulting to 1000 [ 1387.123023][ T28] audit: type=1400 audit(2000001237.404:4743): avc: denied { connect } for pid=13961 comm="syz.1.10350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1387.190952][T13979] loop7: detected capacity change from 0 to 1024 [ 1387.211044][T13972] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10355'. [ 1387.220419][ T28] audit: type=1400 audit(2000001237.494:4744): avc: denied { shutdown } for pid=13971 comm="syz.0.10355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1387.234269][T13979] EXT4-fs: Ignoring removed nobh option [ 1387.251288][T13979] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1387.261106][T13983] netlink: 15 bytes leftover after parsing attributes in process `syz.1.10357'. [ 1387.274456][ T28] audit: type=1400 audit(2000001237.504:4745): avc: denied { setattr } for pid=13980 comm="syz.9.10358" name="NETLINK" dev="sockfs" ino=144001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1387.299405][T13985] bridge1: entered promiscuous mode [ 1387.326364][T13979] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1387.416863][ T8768] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1387.441149][T13999] 9p: Bad value for 'rfdno' [ 1387.475014][T14003] loop9: detected capacity change from 0 to 256 [ 1387.578486][T14008] netlink: 96 bytes leftover after parsing attributes in process `syz.7.10366'. [ 1387.607208][T14008] FAULT_INJECTION: forcing a failure. [ 1387.607208][T14008] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.637487][T14008] CPU: 1 UID: 0 PID: 14008 Comm: syz.7.10366 Tainted: G W syzkaller #0 PREEMPT(full) [ 1387.637515][T14008] Tainted: [W]=WARN [ 1387.637522][T14008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1387.637534][T14008] Call Trace: [ 1387.637540][T14008] [ 1387.637627][T14008] __dump_stack+0x1d/0x30 [ 1387.637726][T14008] dump_stack_lvl+0x95/0xd0 [ 1387.637749][T14008] dump_stack+0x15/0x1b [ 1387.637767][T14008] should_fail_ex+0x263/0x280 [ 1387.637862][T14008] should_failslab+0x8c/0xb0 [ 1387.637879][T14008] __kmalloc_noprof+0xb8/0x4e0 [ 1387.637922][T14008] ? ___neigh_create+0x4c9/0x12a0 [ 1387.637952][T14008] ___neigh_create+0x4c9/0x12a0 [ 1387.637983][T14008] ? neigh_lookup+0x209/0x260 [ 1387.638016][T14008] neigh_add+0x9d7/0xa80 [ 1387.638043][T14008] ? __pfx_neigh_add+0x10/0x10 [ 1387.638063][T14008] rtnetlink_rcv_msg+0x6a7/0x720 [ 1387.638103][T14008] ? avc_has_perm_noaudit+0xab/0x130 [ 1387.638129][T14008] netlink_rcv_skb+0x123/0x220 [ 1387.638185][T14008] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1387.638220][T14008] rtnetlink_rcv+0x1c/0x30 [ 1387.638244][T14008] netlink_unicast+0x5c0/0x690 [ 1387.638298][T14008] netlink_sendmsg+0x5c8/0x6f0 [ 1387.638324][T14008] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1387.638394][T14008] __sys_sendto+0x42e/0x490 [ 1387.638422][T14008] __x64_sys_sendto+0x76/0x90 [ 1387.638519][T14008] x64_sys_call+0x2d35/0x3020 [ 1387.638550][T14008] do_syscall_64+0x12c/0x370 [ 1387.638568][T14008] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1387.638587][T14008] RIP: 0033:0x7f70b8f3c799 [ 1387.638603][T14008] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1387.638626][T14008] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1387.638643][T14008] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1387.638658][T14008] RDX: 0000000000000090 RSI: 0000200000000540 RDI: 0000000000000003 [ 1387.638672][T14008] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1387.638686][T14008] R10: 0000000000048040 R11: 0000000000000246 R12: 0000000000000001 [ 1387.638788][T14008] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1387.638806][T14008] [ 1387.894555][T14015] lo speed is unknown, defaulting to 1000 [ 1387.927582][T14017] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10369'. [ 1387.936827][T14017] bridge_slave_0: default FDB implementation only supports local addresses [ 1388.015028][T14021] netlink: 20 bytes leftover after parsing attributes in process `syz.0.10371'. [ 1388.109769][T14023] loop7: detected capacity change from 0 to 1024 [ 1388.139565][T14027] netlink: 44 bytes leftover after parsing attributes in process `syz.0.10374'. [ 1388.167996][T14020] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10370'. [ 1388.223666][ T28] audit: type=1400 audit(2000001238.504:4746): avc: denied { setattr } for pid=14033 comm="syz.7.10377" name="timer" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1388.278869][T14036] FAULT_INJECTION: forcing a failure. [ 1388.278869][T14036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1388.308586][T14036] CPU: 0 UID: 0 PID: 14036 Comm: syz.7.10378 Tainted: G W syzkaller #0 PREEMPT(full) [ 1388.308673][T14036] Tainted: [W]=WARN [ 1388.308679][T14036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1388.308689][T14036] Call Trace: [ 1388.308694][T14036] [ 1388.308701][T14036] __dump_stack+0x1d/0x30 [ 1388.308728][T14036] dump_stack_lvl+0x95/0xd0 [ 1388.308750][T14036] dump_stack+0x15/0x1b [ 1388.308795][T14036] should_fail_ex+0x263/0x280 [ 1388.308872][T14036] should_fail+0xb/0x20 [ 1388.308893][T14036] should_fail_usercopy+0x1a/0x20 [ 1388.308918][T14036] _copy_from_user+0x1c/0xb0 [ 1388.308945][T14036] ___sys_recvmsg+0xaa/0x3b0 [ 1388.309005][T14036] do_recvmmsg+0x1ef/0x560 [ 1388.309036][T14036] ? get_timespec64+0xd2/0x100 [ 1388.309059][T14036] __x64_sys_recvmmsg+0xfb/0x170 [ 1388.309104][T14036] x64_sys_call+0x80f/0x3020 [ 1388.309193][T14036] do_syscall_64+0x12c/0x370 [ 1388.309215][T14036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1388.309237][T14036] RIP: 0033:0x7f70b8f3c799 [ 1388.309254][T14036] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1388.309347][T14036] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1388.309368][T14036] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1388.309409][T14036] RDX: 0000000000000001 RSI: 0000200000001700 RDI: 0000000000000003 [ 1388.309421][T14036] RBP: 00007f70b798f090 R08: 0000200000001100 R09: 0000000000000000 [ 1388.309433][T14036] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 1388.309447][T14036] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1388.309468][T14036] [ 1388.521188][T14040] dvmrp0: entered allmulticast mode [ 1388.527085][T14040] dvmrp0: left allmulticast mode [ 1388.583459][T14038] lo speed is unknown, defaulting to 1000 [ 1388.686050][T14054] netlink: 20 bytes leftover after parsing attributes in process `syz.0.10384'. [ 1388.847200][ T28] audit: type=1400 audit(2000001239.124:4747): avc: denied { watch watch_reads } for pid=14062 comm="syz.0.10387" path="/17/file0" dev="tmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1388.897275][ T28] audit: type=1326 audit(2000001239.174:4748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14066 comm="syz.7.10388" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f70b8f3c799 code=0x0 [ 1388.917266][T14038] netlink: 32 bytes leftover after parsing attributes in process `syz.5.10379'. [ 1388.946264][T14046] lo speed is unknown, defaulting to 1000 [ 1388.986218][ T28] audit: type=1326 audit(2000001239.264:4749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14045 comm="syz.1.10382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1389.027198][ T28] audit: type=1326 audit(2000001239.264:4750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14045 comm="syz.1.10382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1389.148105][T14088] loop5: detected capacity change from 0 to 256 [ 1389.167521][T14086] FAULT_INJECTION: forcing a failure. [ 1389.167521][T14086] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1389.186079][T14086] CPU: 0 UID: 0 PID: 14086 Comm: syz.1.10392 Tainted: G W syzkaller #0 PREEMPT(full) [ 1389.186160][T14086] Tainted: [W]=WARN [ 1389.186168][T14086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1389.186180][T14086] Call Trace: [ 1389.186188][T14086] [ 1389.186196][T14086] __dump_stack+0x1d/0x30 [ 1389.186223][T14086] dump_stack_lvl+0x95/0xd0 [ 1389.186268][T14086] dump_stack+0x15/0x1b [ 1389.186290][T14086] should_fail_ex+0x263/0x280 [ 1389.186321][T14086] should_fail+0xb/0x20 [ 1389.186340][T14086] should_fail_usercopy+0x1a/0x20 [ 1389.186365][T14086] _copy_from_user+0x1c/0xb0 [ 1389.186405][T14086] __sys_bpf+0x183/0x7e0 [ 1389.186432][T14086] __x64_sys_bpf+0x41/0x50 [ 1389.186460][T14086] x64_sys_call+0x10cb/0x3020 [ 1389.186554][T14086] do_syscall_64+0x12c/0x370 [ 1389.186575][T14086] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1389.186597][T14086] RIP: 0033:0x7fd5084cc799 [ 1389.186612][T14086] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1389.186670][T14086] RSP: 002b:00007fd506f27028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1389.186692][T14086] RAX: ffffffffffffffda RBX: 00007fd508745fa0 RCX: 00007fd5084cc799 [ 1389.186707][T14086] RDX: 0000000000000094 RSI: 0000200000000780 RDI: 0000000000000005 [ 1389.186720][T14086] RBP: 00007fd506f27090 R08: 0000000000000000 R09: 0000000000000000 [ 1389.186835][T14086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1389.186849][T14086] R13: 00007fd508746038 R14: 00007fd508745fa0 R15: 00007ffd8c579f98 [ 1389.186869][T14086] [ 1389.607933][T14101] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10395'. [ 1389.620433][T14101] loop1: detected capacity change from 0 to 128 [ 1389.665450][T14063] Process accounting resumed [ 1389.685183][T14104] loop0: detected capacity change from 0 to 512 [ 1389.699262][T14104] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1389.712047][T14104] ext4 filesystem being mounted at /18/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 1389.729342][ T5786] lo speed is unknown, defaulting to 1000 [ 1389.740364][ T5786] syz0: Port: 1 Link DOWN [ 1389.858284][T14123] FAULT_INJECTION: forcing a failure. [ 1389.858284][T14123] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.873648][T13674] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1389.893115][T14123] CPU: 0 UID: 0 PID: 14123 Comm: syz.9.10401 Tainted: G W syzkaller #0 PREEMPT(full) [ 1389.893146][T14123] Tainted: [W]=WARN [ 1389.893154][T14123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1389.893231][T14123] Call Trace: [ 1389.893237][T14123] [ 1389.893244][T14123] __dump_stack+0x1d/0x30 [ 1389.893267][T14123] dump_stack_lvl+0x95/0xd0 [ 1389.893287][T14123] dump_stack+0x15/0x1b [ 1389.893312][T14123] should_fail_ex+0x263/0x280 [ 1389.893335][T14123] should_failslab+0x8c/0xb0 [ 1389.893384][T14123] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 1389.893404][T14123] ? __alloc_skb+0x2d6/0x690 [ 1389.893480][T14123] __alloc_skb+0x2d6/0x690 [ 1389.893500][T14123] ? __alloc_skb+0x200/0x690 [ 1389.893518][T14123] netlink_alloc_large_skb+0xbf/0xf0 [ 1389.893540][T14123] netlink_sendmsg+0x40c/0x6f0 [ 1389.893592][T14123] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1389.893619][T14123] ____sys_sendmsg+0x563/0x5b0 [ 1389.893679][T14123] ___sys_sendmsg+0x195/0x1e0 [ 1389.893710][T14123] __x64_sys_sendmsg+0xd4/0x160 [ 1389.893791][T14123] x64_sys_call+0x194c/0x3020 [ 1389.893815][T14123] do_syscall_64+0x12c/0x370 [ 1389.893833][T14123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1389.893896][T14123] RIP: 0033:0x7f17319cc799 [ 1389.893911][T14123] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1389.893976][T14123] RSP: 002b:00007f1730427028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1389.893993][T14123] RAX: ffffffffffffffda RBX: 00007f1731c45fa0 RCX: 00007f17319cc799 [ 1389.894005][T14123] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 1389.894018][T14123] RBP: 00007f1730427090 R08: 0000000000000000 R09: 0000000000000000 [ 1389.894031][T14123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1389.894100][T14123] R13: 00007f1731c46038 R14: 00007f1731c45fa0 R15: 00007ffe4568ec58 [ 1389.894121][T14123] [ 1390.201522][T14135] lo speed is unknown, defaulting to 1000 [ 1390.224993][T14138] netlink: 'syz.5.10405': attribute type 12 has an invalid length. [ 1390.667056][T14144] lo speed is unknown, defaulting to 1000 [ 1391.359262][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 1391.359282][ T28] audit: type=1326 audit(2000001241.644:4753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14148 comm="syz.7.10407" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f70b8f3c799 code=0x0 [ 1391.461812][T14130] openvswitch: netlink: Missing key (keys=40, expected=200000) [ 1392.206283][T14163] FAULT_INJECTION: forcing a failure. [ 1392.206283][T14163] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1392.208082][T14164] loop7: detected capacity change from 0 to 512 [ 1392.223006][T14163] CPU: 1 UID: 0 PID: 14163 Comm: syz.9.10412 Tainted: G W syzkaller #0 PREEMPT(full) [ 1392.223086][T14163] Tainted: [W]=WARN [ 1392.223093][T14163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1392.223105][T14163] Call Trace: [ 1392.223112][T14163] [ 1392.223120][T14163] __dump_stack+0x1d/0x30 [ 1392.223145][T14163] dump_stack_lvl+0x95/0xd0 [ 1392.223238][T14163] dump_stack+0x15/0x1b [ 1392.223258][T14163] should_fail_ex+0x263/0x280 [ 1392.223281][T14163] should_fail+0xb/0x20 [ 1392.223300][T14163] should_fail_usercopy+0x1a/0x20 [ 1392.223401][T14163] _copy_from_user+0x1c/0xb0 [ 1392.223427][T14163] ___sys_sendmsg+0xc1/0x1e0 [ 1392.223464][T14163] __x64_sys_sendmsg+0xd4/0x160 [ 1392.223528][T14163] x64_sys_call+0x194c/0x3020 [ 1392.223553][T14163] do_syscall_64+0x12c/0x370 [ 1392.223574][T14163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1392.223596][T14163] RIP: 0033:0x7f17319cc799 [ 1392.223732][T14163] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1392.223755][T14163] RSP: 002b:00007f1730427028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1392.223775][T14163] RAX: ffffffffffffffda RBX: 00007f1731c45fa0 RCX: 00007f17319cc799 [ 1392.223848][T14163] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000006 [ 1392.223860][T14163] RBP: 00007f1730427090 R08: 0000000000000000 R09: 0000000000000000 [ 1392.223878][T14163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1392.223890][T14163] R13: 00007f1731c46038 R14: 00007f1731c45fa0 R15: 00007ffe4568ec58 [ 1392.223909][T14163] [ 1392.396192][T14164] EXT4-fs (loop7): can't mount with both data=journal and delalloc [ 1392.418203][ T28] audit: type=1400 audit(2000001242.694:4754): avc: denied { accept } for pid=14162 comm="syz.7.10413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1392.441963][T14167] loop7: detected capacity change from 0 to 512 [ 1392.480897][T14167] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 1392.494623][T14167] EXT4-fs (loop7): 1 truncate cleaned up [ 1392.502343][T14169] loop9: detected capacity change from 0 to 256 [ 1392.509479][T14167] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1392.772776][T14184] loop5: detected capacity change from 0 to 512 [ 1393.000811][T14167] netlink: 'syz.7.10414': attribute type 21 has an invalid length. [ 1393.027348][T14167] __nla_validate_parse: 3 callbacks suppressed [ 1393.027648][T14167] netlink: 128 bytes leftover after parsing attributes in process `syz.7.10414'. [ 1393.123319][T14167] netlink: 'syz.7.10414': attribute type 5 has an invalid length. [ 1393.131198][T14167] netlink: 'syz.7.10414': attribute type 6 has an invalid length. [ 1393.139031][T14167] netlink: 3 bytes leftover after parsing attributes in process `syz.7.10414'. [ 1393.273786][ T8768] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1393.297473][T14200] loop7: detected capacity change from 0 to 512 [ 1393.298440][ T28] audit: type=1326 audit(2000001243.584:4755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5bc22dc799 code=0x7ffc0000 [ 1393.336360][T14196] netlink: 20 bytes leftover after parsing attributes in process `syz.0.10424'. [ 1393.379731][T14200] Quota error (device loop7): v2_read_file_info: Free block number 1 out of range (1, 6). [ 1393.392062][T14200] EXT4-fs warning (device loop7): ext4_enable_quotas:7236: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1393.397203][ T28] audit: type=1326 audit(2000001243.584:4756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5bc22dc799 code=0x7ffc0000 [ 1393.463483][T14200] EXT4-fs (loop7): mount failed [ 1393.470377][ T28] audit: type=1326 audit(2000001243.584:4757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f5bc22dc799 code=0x7ffc0000 [ 1393.494736][ T28] audit: type=1326 audit(2000001243.584:4758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f5bc22dc502 code=0x7ffc0000 [ 1393.534125][ T28] audit: type=1326 audit(2000001243.614:4759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5bc229cfce code=0x7ffc0000 [ 1393.565291][ T28] audit: type=1326 audit(2000001243.614:4760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f5bc22dc5c7 code=0x7ffc0000 [ 1393.589361][ T28] audit: type=1326 audit(2000001243.614:4761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14195 comm="syz.0.10424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5bc229cfce code=0x7ffc0000 [ 1393.790968][T14579] bond0 (unregistering): Released all slaves [ 1393.842777][T14579] hsr_slave_0: left promiscuous mode [ 1393.849359][T14579] hsr_slave_1: left promiscuous mode [ 1393.859060][T14579] veth1_macvtap: left promiscuous mode [ 1393.864591][T14579] veth0_macvtap: left promiscuous mode [ 1393.870262][T14579] veth1_vlan: left promiscuous mode [ 1393.875536][T14579] veth0_vlan: left promiscuous mode [ 1393.975516][T14219] lo speed is unknown, defaulting to 1000 [ 1394.037420][T14219] chnl_net:caif_netlink_parms(): no params data found [ 1394.080798][T14219] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.088404][T14219] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.096114][T14219] bridge_slave_0: entered allmulticast mode [ 1394.103263][T14219] bridge_slave_0: entered promiscuous mode [ 1394.110266][T14219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.117604][T14219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.124847][T14219] bridge_slave_1: entered allmulticast mode [ 1394.133149][T14219] bridge_slave_1: entered promiscuous mode [ 1394.161443][T14219] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1394.172999][T14263] sch_fq: defrate 7 ignored. [ 1394.178066][T14263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14263 comm=syz.9.10436 [ 1394.180298][T14219] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1394.208958][T14219] team0: Port device team_slave_0 added [ 1394.215564][T14219] team0: Port device team_slave_1 added [ 1394.231382][T14219] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1394.238440][T14219] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1394.271860][T14219] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1394.277980][T14273] loop1: detected capacity change from 0 to 512 [ 1394.290522][T14219] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1394.310110][T14273] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1394.312603][T14219] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1394.346132][T14219] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1394.361745][T14273] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz.1.10438: bad orphan inode 131083 [ 1394.372338][T14273] loop1: lost filesystem error report for type 5 error -117 [ 1394.373876][T14273] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1394.419360][T14219] hsr_slave_0: entered promiscuous mode [ 1394.425427][T14219] hsr_slave_1: entered promiscuous mode [ 1394.431281][T14219] debugfs: 'hsr0' already exists in 'hsr' [ 1394.437075][T14219] Cannot create hsr debugfs directory [ 1394.480584][T14292] loop7: detected capacity change from 0 to 512 [ 1394.500186][T10951] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1394.510903][T14292] EXT4-fs (loop7): couldn't mount as ext3 due to feature incompatibilities [ 1394.546155][T14219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.553336][T14219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1394.560701][T14219] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.567849][T14219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.634342][T14219] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1394.652526][ T6550] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.660598][ T6550] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.697533][T14219] 8021q: adding VLAN 0 to HW filter on device team0 [ 1394.714851][ T6550] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.721979][ T6550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.742099][T13946] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.749332][T13946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1395.071516][T14362] loop9: detected capacity change from 0 to 1024 [ 1395.095732][T14219] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1395.106261][T14362] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1395.138502][T14375] loop7: detected capacity change from 0 to 128 [ 1395.273795][T14219] veth0_vlan: entered promiscuous mode [ 1395.281170][T14219] veth1_vlan: entered promiscuous mode [ 1395.311055][T14219] veth0_macvtap: entered promiscuous mode [ 1395.320827][T14219] veth1_macvtap: entered promiscuous mode [ 1395.336664][T14219] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1395.406476][T14219] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1395.581145][T14391] loop5: detected capacity change from 0 to 128 [ 1395.856290][T13726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1397.133415][T14412] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1397.200598][T14412] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1397.266532][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.279472][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.282447][T14421] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10459'. [ 1397.302320][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.313398][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.324808][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.336259][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.347451][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.358394][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.369568][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.381754][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 1397.381765][ T28] audit: type=1326 audit(2000001247.664:4823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14420 comm="syz.1.10459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1397.412024][T14219] EXT4-fs error (device loop5): ext4_empty_dir:3075: inode #12: comm syz-executor: invalid size [ 1397.426218][ T28] audit: type=1326 audit(2000001247.664:4824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14420 comm="syz.1.10459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1397.467990][T14426] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10462'. [ 1397.470253][T14428] set_capacity_and_notify: 1 callbacks suppressed [ 1397.470267][T14428] loop7: detected capacity change from 0 to 256 [ 1397.570118][T14418] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1397.680420][T14783] bridge_slave_1: left allmulticast mode [ 1397.686137][T14783] bridge_slave_1: left promiscuous mode [ 1397.692071][T14783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.700124][T14783] bridge_slave_0: left allmulticast mode [ 1397.707197][T14783] bridge_slave_0: left promiscuous mode [ 1397.712993][T14783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.901874][T14783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1397.944492][T14783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1397.983177][T14783] bond0 (unregistering): Released all slaves [ 1398.017096][T14444] lo speed is unknown, defaulting to 1000 [ 1398.104364][T14783] hsr_slave_0: left promiscuous mode [ 1398.105774][T14783] hsr_slave_1: left promiscuous mode [ 1398.107960][T14783] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1398.107988][T14783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1398.109489][T14783] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1398.109641][T14783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1398.134666][T14783] veth1_macvtap: left promiscuous mode [ 1398.134725][T14783] veth0_macvtap: left promiscuous mode [ 1398.134792][T14783] veth1_vlan: left promiscuous mode [ 1398.134848][T14783] veth0_vlan: left promiscuous mode [ 1398.342778][T14783] team0 (unregistering): Port device team_slave_1 removed [ 1398.347712][T14783] team0 (unregistering): Port device team_slave_0 removed [ 1398.540065][T14437] lo speed is unknown, defaulting to 1000 [ 1398.692148][T14437] chnl_net:caif_netlink_parms(): no params data found [ 1398.732198][T14437] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.739420][T14437] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.746711][T14437] bridge_slave_0: entered allmulticast mode [ 1398.753591][T14437] bridge_slave_0: entered promiscuous mode [ 1398.760972][T14437] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.771614][T14437] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.778971][T14437] bridge_slave_1: entered allmulticast mode [ 1398.785522][T14437] bridge_slave_1: entered promiscuous mode [ 1398.808035][T14437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1398.818657][T14437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1398.839871][T14437] team0: Port device team_slave_0 added [ 1398.846476][T14437] team0: Port device team_slave_1 added [ 1398.861761][T14437] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1398.887234][T14437] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1399.016806][T14437] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1399.033566][T14437] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1399.040950][T14437] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1399.299408][T14437] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1399.358437][T14437] hsr_slave_0: entered promiscuous mode [ 1399.365361][T14437] hsr_slave_1: entered promiscuous mode [ 1399.372024][T14437] debugfs: 'hsr0' already exists in 'hsr' [ 1399.597826][T14437] Cannot create hsr debugfs directory [ 1399.675509][T14478] netlink: 20 bytes leftover after parsing attributes in process `syz.7.10475'. [ 1399.819443][T14483] netlink: 16 bytes leftover after parsing attributes in process `syz.0.10474'. [ 1400.010247][T14437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1400.056382][T14437] 8021q: adding VLAN 0 to HW filter on device team0 [ 1400.091575][ T6551] bridge0: port 1(bridge_slave_0) entered blocking state [ 1400.098720][ T6551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1400.163652][ T6551] bridge0: port 2(bridge_slave_1) entered blocking state [ 1400.170805][ T6551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1400.296884][ T28] audit: type=1326 audit(2000001250.574:4825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.407016][ T28] audit: type=1326 audit(2000001250.574:4826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.470952][T14437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1400.505170][ T28] audit: type=1326 audit(2000001250.574:4827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.538605][T14515] FAULT_INJECTION: forcing a failure. [ 1400.538605][T14515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1400.575723][T14515] CPU: 0 UID: 0 PID: 14515 Comm: syz.9.10479 Tainted: G W syzkaller #0 PREEMPT(full) [ 1400.575807][T14515] Tainted: [W]=WARN [ 1400.575815][T14515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1400.575828][T14515] Call Trace: [ 1400.575835][T14515] [ 1400.575844][T14515] __dump_stack+0x1d/0x30 [ 1400.575871][T14515] dump_stack_lvl+0x95/0xd0 [ 1400.575969][T14515] dump_stack+0x15/0x1b [ 1400.575991][T14515] should_fail_ex+0x263/0x280 [ 1400.576070][T14515] should_fail+0xb/0x20 [ 1400.576086][T14515] should_fail_usercopy+0x1a/0x20 [ 1400.576106][T14515] _copy_from_user+0x1c/0xb0 [ 1400.576191][T14515] ___sys_sendmsg+0xc1/0x1e0 [ 1400.576227][T14515] __x64_sys_sendmsg+0xd4/0x160 [ 1400.576256][T14515] x64_sys_call+0x194c/0x3020 [ 1400.576283][T14515] do_syscall_64+0x12c/0x370 [ 1400.576305][T14515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1400.576369][T14515] RIP: 0033:0x7f17319cc799 [ 1400.576467][T14515] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1400.576483][T14515] RSP: 002b:00007f1730406028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1400.576504][T14515] RAX: ffffffffffffffda RBX: 00007f1731c46090 RCX: 00007f17319cc799 [ 1400.576519][T14515] RDX: 0000000000000040 RSI: 0000200000009b40 RDI: 0000000000000004 [ 1400.576532][T14515] RBP: 00007f1730406090 R08: 0000000000000000 R09: 0000000000000000 [ 1400.576546][T14515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1400.576594][T14515] R13: 00007f1731c46128 R14: 00007f1731c46090 R15: 00007ffe4568ec58 [ 1400.576614][T14515] [ 1400.746513][ T28] audit: type=1326 audit(2000001250.604:4828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.771895][ T28] audit: type=1326 audit(2000001250.604:4829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.797066][ T28] audit: type=1326 audit(2000001250.604:4830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.833547][ T28] audit: type=1326 audit(2000001250.664:4831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1400.866607][ T28] audit: type=1326 audit(2000001250.664:4832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14507 comm="syz.7.10481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f70b8f3c502 code=0x7ffc0000 [ 1401.025133][T14437] veth0_vlan: entered promiscuous mode [ 1401.036255][T14437] veth1_vlan: entered promiscuous mode [ 1401.124373][T14437] veth0_macvtap: entered promiscuous mode [ 1401.153268][T14437] veth1_macvtap: entered promiscuous mode [ 1401.164174][T14437] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1401.175137][T14437] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1401.206600][T14534] loop7: detected capacity change from 0 to 256 [ 1401.261671][T14537] loop8: detected capacity change from 0 to 512 [ 1401.280454][T14537] /dev/loop8: Can't open blockdev [ 1401.295038][T14540] netlink: 20 bytes leftover after parsing attributes in process `syz.9.10485'. [ 1401.832450][T14564] netlink: 100 bytes leftover after parsing attributes in process `syz.0.10493'. [ 1401.859352][T14564] netlink: 81 bytes leftover after parsing attributes in process `syz.0.10493'. [ 1402.051512][T14571] tipc: Started in network mode [ 1402.069732][T14571] tipc: Node identity 01000080000000005f5f002d00405f3a, cluster identity 4711 [ 1402.235357][T14578] netlink: 20 bytes leftover after parsing attributes in process `syz.7.10499'. [ 1402.513100][T14591] program syz.1.10503 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1402.525354][T14591] FAULT_INJECTION: forcing a failure. [ 1402.525354][T14591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1402.557196][T14591] CPU: 0 UID: 0 PID: 14591 Comm: syz.1.10503 Tainted: G W syzkaller #0 PREEMPT(full) [ 1402.557230][T14591] Tainted: [W]=WARN [ 1402.557246][T14591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1402.557259][T14591] Call Trace: [ 1402.557267][T14591] [ 1402.557275][T14591] __dump_stack+0x1d/0x30 [ 1402.557298][T14591] dump_stack_lvl+0x95/0xd0 [ 1402.557321][T14591] dump_stack+0x15/0x1b [ 1402.557441][T14591] should_fail_ex+0x263/0x280 [ 1402.557462][T14591] should_fail+0xb/0x20 [ 1402.557534][T14591] should_fail_usercopy+0x1a/0x20 [ 1402.557559][T14591] _copy_from_user+0x1c/0xb0 [ 1402.557582][T14591] scsi_ioctl+0x139b/0x1750 [ 1402.557605][T14591] ? __rcu_read_unlock+0x4e/0x70 [ 1402.557634][T14591] ? avc_has_perm_noaudit+0xab/0x130 [ 1402.557657][T14591] ? avc_has_perm+0x101/0x190 [ 1402.557683][T14591] ? do_vfs_ioctl+0x84f/0xe70 [ 1402.557751][T14591] sg_ioctl+0xebf/0x1350 [ 1402.557782][T14591] ? __pfx_sg_ioctl+0x10/0x10 [ 1402.557805][T14591] __se_sys_ioctl+0xce/0x140 [ 1402.557862][T14591] __x64_sys_ioctl+0x43/0x50 [ 1402.557889][T14591] x64_sys_call+0x1563/0x3020 [ 1402.557911][T14591] do_syscall_64+0x12c/0x370 [ 1402.557932][T14591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1402.557998][T14591] RIP: 0033:0x7fd5084cc799 [ 1402.558015][T14591] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1402.558140][T14591] RSP: 002b:00007fd506f27028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1402.558158][T14591] RAX: ffffffffffffffda RBX: 00007fd508745fa0 RCX: 00007fd5084cc799 [ 1402.558171][T14591] RDX: 0000200000000040 RSI: 0000000000000001 RDI: 0000000000000003 [ 1402.558213][T14591] RBP: 00007fd506f27090 R08: 0000000000000000 R09: 0000000000000000 [ 1402.558225][T14591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1402.558235][T14591] R13: 00007fd508746038 R14: 00007fd508745fa0 R15: 00007ffd8c579f98 [ 1402.558333][T14591] [ 1402.876629][T14601] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1402.906647][T14601] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1402.929239][T14601] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10507'. [ 1403.693754][T14622] loop7: detected capacity change from 0 to 512 [ 1403.731092][T14622] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 1403.770659][T14622] EXT4-fs error (device loop7): ext4_validate_block_bitmap:432: comm syz.7.10513: bg 0: block 4: invalid block bitmap [ 1403.821378][T14622] loop7: lost filesystem error report for type 5 error -117 [ 1403.824060][T14622] EXT4-fs (loop7): 1 truncate cleaned up [ 1403.831424][ C1] EXT4-fs (loop7): error count since last fsck: 1 [ 1403.831466][ C1] EXT4-fs (loop7): initial error at time 2000001254: ext4_validate_block_bitmap:432 [ 1403.831486][ C1] EXT4-fs (loop7): last error at time 2000001254: ext4_validate_block_bitmap:432 [ 1403.907645][T14622] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1403.939087][T14641] FAULT_INJECTION: forcing a failure. [ 1403.939087][T14641] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1403.952383][T14641] CPU: 0 UID: 0 PID: 14641 Comm: syz.9.10520 Tainted: G W syzkaller #0 PREEMPT(full) [ 1403.952414][T14641] Tainted: [W]=WARN [ 1403.952421][T14641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1403.952432][T14641] Call Trace: [ 1403.952438][T14641] [ 1403.952444][T14641] __dump_stack+0x1d/0x30 [ 1403.952496][T14641] dump_stack_lvl+0x95/0xd0 [ 1403.952520][T14641] dump_stack+0x15/0x1b [ 1403.952538][T14641] should_fail_ex+0x263/0x280 [ 1403.952561][T14641] should_fail+0xb/0x20 [ 1403.952661][T14641] should_fail_usercopy+0x1a/0x20 [ 1403.952708][T14641] _copy_to_user+0x20/0xa0 [ 1403.952736][T14641] simple_read_from_buffer+0xb5/0x130 [ 1403.952760][T14641] proc_fail_nth_read+0x10e/0x150 [ 1403.952866][T14641] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1403.952943][T14641] vfs_read+0x1ab/0x7f0 [ 1403.952968][T14641] ? __rcu_read_unlock+0x4e/0x70 [ 1403.953027][T14641] ? __fget_files+0x184/0x1c0 [ 1403.953051][T14641] ? mutex_lock+0x57/0x90 [ 1403.953140][T14641] ksys_read+0xdc/0x1a0 [ 1403.953174][T14641] __x64_sys_read+0x40/0x50 [ 1403.953251][T14641] x64_sys_call+0x2886/0x3020 [ 1403.953292][T14641] do_syscall_64+0x12c/0x370 [ 1403.953314][T14641] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1403.953343][T14641] RIP: 0033:0x7f173198cfce [ 1403.953411][T14641] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1403.953425][T14641] RSP: 002b:00007f1730426fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1403.953454][T14641] RAX: ffffffffffffffda RBX: 00007f17304276c0 RCX: 00007f173198cfce [ 1403.953466][T14641] RDX: 000000000000000f RSI: 00007f17304270a0 RDI: 0000000000000004 [ 1403.953483][T14641] RBP: 00007f1730427090 R08: 0000000000000000 R09: 0000000000000000 [ 1403.953496][T14641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1403.953509][T14641] R13: 00007f1731c46038 R14: 00007f1731c45fa0 R15: 00007ffe4568ec58 [ 1403.953529][T14641] [ 1404.366934][ T8768] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1404.438970][T14659] program syz.8.10525 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1404.681930][T14672] lo speed is unknown, defaulting to 1000 [ 1404.858521][T14683] hub 8-0:1.0: USB hub found [ 1404.863459][T14683] hub 8-0:1.0: 8 ports detected [ 1405.370322][T14689] loop9: detected capacity change from 0 to 256 [ 1405.555420][T14698] x_tables: duplicate underflow at hook 1 [ 1405.557352][ T28] kauditd_printk_skb: 141 callbacks suppressed [ 1405.557367][ T28] audit: type=1400 audit(2000001255.834:4974): avc: denied { ioctl } for pid=14697 comm="syz.0.10542" path="socket:[147005]" dev="sockfs" ino=147005 ioctlcmd=0x587f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1405.614987][ T28] audit: type=1400 audit(2000001255.834:4975): avc: denied { setattr } for pid=14697 comm="syz.0.10542" path="socket:[147006]" dev="sockfs" ino=147006 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1405.653959][ T28] audit: type=1400 audit(2000001255.844:4976): avc: denied { append } for pid=14697 comm="syz.0.10542" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1405.841272][ T28] audit: type=1326 audit(2000001256.114:4977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1405.871741][ T28] audit: type=1326 audit(2000001256.114:4978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1405.896614][ T28] audit: type=1326 audit(2000001256.114:4979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1405.920342][ T28] audit: type=1326 audit(2000001256.124:4980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1405.944064][ T28] audit: type=1326 audit(2000001256.124:4981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1405.980825][ T28] audit: type=1326 audit(2000001256.124:4982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1406.005989][ T28] audit: type=1326 audit(2000001256.184:4983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.8.10552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1406.928150][T14745] Invalid ELF header magic: != ELF [ 1407.015115][T14760] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10567'. [ 1407.020534][T14760] 8021q: adding VLAN 0 to HW filter on device team1 [ 1407.032465][T14760] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10567'. [ 1407.032741][T14760] team2 (uninitialized): Failed to send options change via netlink (err -105) [ 1407.037800][T14760] 8021q: adding VLAN 0 to HW filter on device team2 [ 1407.139515][T14769] syzkaller0: entered promiscuous mode [ 1407.149941][T14769] syzkaller0: entered allmulticast mode [ 1407.211758][T14780] FAULT_INJECTION: forcing a failure. [ 1407.211758][T14780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1407.220671][T14778] netlink: 92 bytes leftover after parsing attributes in process `syz.9.10576'. [ 1407.224997][T14780] CPU: 1 UID: 0 PID: 14780 Comm: syz.8.10577 Tainted: G W syzkaller #0 PREEMPT(full) [ 1407.225063][T14780] Tainted: [W]=WARN [ 1407.225070][T14780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1407.225083][T14780] Call Trace: [ 1407.225090][T14780] [ 1407.225098][T14780] __dump_stack+0x1d/0x30 [ 1407.225142][T14780] dump_stack_lvl+0x95/0xd0 [ 1407.225164][T14780] dump_stack+0x15/0x1b [ 1407.225201][T14780] should_fail_ex+0x263/0x280 [ 1407.225223][T14780] should_fail+0xb/0x20 [ 1407.225243][T14780] should_fail_usercopy+0x1a/0x20 [ 1407.225266][T14780] _copy_from_user+0x1c/0xb0 [ 1407.225354][T14780] bpf_ctx_init+0xfb/0x160 [ 1407.225434][T14780] bpf_prog_test_run_sk_lookup+0x1b4/0x790 [ 1407.225461][T14780] ? kstrtouint+0x76/0xc0 [ 1407.225510][T14780] ? __rcu_read_unlock+0x4e/0x70 [ 1407.225557][T14780] ? __pfx_bpf_prog_test_run_sk_lookup+0x10/0x10 [ 1407.225584][T14780] bpf_prog_test_run+0x204/0x340 [ 1407.225607][T14780] __sys_bpf+0x52e/0x7e0 [ 1407.225680][T14780] __x64_sys_bpf+0x41/0x50 [ 1407.225731][T14780] x64_sys_call+0x10cb/0x3020 [ 1407.225755][T14780] do_syscall_64+0x12c/0x370 [ 1407.225776][T14780] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1407.225825][T14780] RIP: 0033:0x7f17d1f3c799 [ 1407.225916][T14780] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1407.226006][T14780] RSP: 002b:00007f17d098f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1407.226025][T14780] RAX: ffffffffffffffda RBX: 00007f17d21b5fa0 RCX: 00007f17d1f3c799 [ 1407.226039][T14780] RDX: 0000000000000048 RSI: 0000200000000440 RDI: 000000000000000a [ 1407.226052][T14780] RBP: 00007f17d098f090 R08: 0000000000000000 R09: 0000000000000000 [ 1407.226065][T14780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1407.226077][T14780] R13: 00007f17d21b6038 R14: 00007f17d21b5fa0 R15: 00007ffc20fea218 [ 1407.226122][T14780] [ 1407.456776][T14796] loop8: detected capacity change from 0 to 512 [ 1407.487003][T14796] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1407.499693][T14796] ext4 filesystem being mounted at /18/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 1407.526140][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1407.628918][T14820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=14820 comm=syz.1.10590 [ 1407.697926][T14817] usb usb8: usbfs: process 14817 (syz.9.10587) did not claim interface 0 before use [ 1407.697969][T14826] usb usb8: usbfs: process 14826 (syz.9.10587) did not claim interface 0 before use [ 1408.061745][T14836] lo speed is unknown, defaulting to 1000 [ 1408.569341][T14870] lo speed is unknown, defaulting to 1000 [ 1408.954554][T14893] FAULT_INJECTION: forcing a failure. [ 1408.954554][T14893] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.995816][T14895] netlink: 'syz.8.10617': attribute type 15 has an invalid length. [ 1409.007231][T14893] CPU: 0 UID: 0 PID: 14893 Comm: syz.7.10619 Tainted: G W syzkaller #0 PREEMPT(full) [ 1409.007259][T14893] Tainted: [W]=WARN [ 1409.007265][T14893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1409.007275][T14893] Call Trace: [ 1409.007281][T14893] [ 1409.007288][T14893] __dump_stack+0x1d/0x30 [ 1409.007351][T14893] dump_stack_lvl+0x95/0xd0 [ 1409.007373][T14893] dump_stack+0x15/0x1b [ 1409.007390][T14893] should_fail_ex+0x263/0x280 [ 1409.007410][T14893] ? __se_sys_memfd_create+0x1df/0x3b0 [ 1409.007481][T14893] should_failslab+0x8c/0xb0 [ 1409.007503][T14893] __kmalloc_cache_noprof+0x5f/0x410 [ 1409.007526][T14893] ? fput+0x8f/0xc0 [ 1409.007625][T14893] __se_sys_memfd_create+0x1df/0x3b0 [ 1409.007651][T14893] __x64_sys_memfd_create+0x31/0x40 [ 1409.007679][T14893] x64_sys_call+0x1f22/0x3020 [ 1409.007789][T14893] do_syscall_64+0x12c/0x370 [ 1409.007812][T14893] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1409.007834][T14893] RIP: 0033:0x7f70b8f3c799 [ 1409.007850][T14893] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1409.007916][T14893] RSP: 002b:00007f70b798ee08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 1409.007932][T14893] RAX: ffffffffffffffda RBX: 00000000000004ee RCX: 00007f70b8f3c799 [ 1409.007946][T14893] RDX: 00007f70b798eee0 RSI: 0000000000000000 RDI: 00007f70b8fd2db9 [ 1409.007960][T14893] RBP: 0000200000001100 R08: 00000000ffffffff R09: 0000000000000000 [ 1409.007981][T14893] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000080 [ 1409.008049][T14893] R13: 00007f70b798eee0 R14: 00007f70b798eea0 R15: 0000200000000000 [ 1409.008072][T14893] [ 1409.208866][T14899] syzkaller0: entered promiscuous mode [ 1409.214480][T14899] syzkaller0: entered allmulticast mode [ 1409.445986][T14908] lo speed is unknown, defaulting to 1000 [ 1409.579555][T14917] loop7: detected capacity change from 0 to 512 [ 1409.611148][T14921] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0_to_bond, syncid = 0, id = 0 [ 1409.623483][T14917] EXT4-fs error (device loop7): ext4_orphan_get:1396: comm syz.7.10620: couldn't read orphan inode 26 (err -116) [ 1409.695074][T14917] loop7: lost filesystem error report for type 5 error -116 [ 1409.697362][T14917] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1409.718251][T14928] syzkaller0: entered promiscuous mode [ 1409.723799][T14928] syzkaller0: entered allmulticast mode [ 1409.773188][T14917] ext4 filesystem being mounted at /275/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1410.138738][T14940] netlink: 32 bytes leftover after parsing attributes in process `syz.9.10634'. [ 1410.159919][ T8768] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1410.308769][T14945] lo speed is unknown, defaulting to 1000 [ 1411.031976][T14972] loop8: detected capacity change from 0 to 512 [ 1411.068184][T14972] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1411.088551][T14972] ext4 filesystem being mounted at /38/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 1411.131932][T14976] netlink: 536 bytes leftover after parsing attributes in process `syz.9.10645'. [ 1411.222554][T14986] loop9: detected capacity change from 0 to 512 [ 1411.223737][T14984] lo speed is unknown, defaulting to 1000 [ 1411.239562][T14986] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 1411.269142][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1411.288304][T14986] EXT4-fs error (device loop9): ext4_orphan_get:1417: comm syz.9.10650: bad orphan inode 131083 [ 1411.332972][T14994] netlink: 20 bytes leftover after parsing attributes in process `syz.8.10652'. [ 1411.355800][T14986] loop9: lost filesystem error report for type 5 error -117 [ 1411.357153][ C1] EXT4-fs (loop9): error count since last fsck: 1 [ 1411.370921][ C1] EXT4-fs (loop9): initial error at time 2000001261: ext4_orphan_get:1417 [ 1411.379442][ C1] EXT4-fs (loop9): last error at time 2000001261: ext4_orphan_get:1417 [ 1411.388815][T14986] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1411.406324][ T28] kauditd_printk_skb: 62 callbacks suppressed [ 1411.406337][ T28] audit: type=1400 audit(2000001261.684:5046): avc: denied { accept } for pid=14993 comm="syz.8.10652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1411.437207][ T28] audit: type=1326 audit(2000001261.714:5047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.461153][ T28] audit: type=1326 audit(2000001261.714:5048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.512161][ T28] audit: type=1326 audit(2000001261.714:5049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.543374][T14986] EXT4-fs error (device loop9): ext4_find_dest_de:2050: inode #2: block 13: comm syz.9.10650: bad entry in directory: '.' directory cannot be the last in data block - offset=0, inode=2, rec_len=1024, size=1024 fake=1 [ 1411.552335][ T28] audit: type=1326 audit(2000001261.714:5050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=43 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.591004][ T28] audit: type=1326 audit(2000001261.714:5051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.597911][T15001] loop8: detected capacity change from 0 to 4096 [ 1411.616410][ T28] audit: type=1326 audit(2000001261.714:5052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.644713][ T28] audit: type=1326 audit(2000001261.714:5053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.669018][ T28] audit: type=1326 audit(2000001261.714:5054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.669811][T13726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1411.692807][ T28] audit: type=1326 audit(2000001261.714:5055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14993 comm="syz.8.10652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1411.723727][T15001] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1411.949458][T15001] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10655'. [ 1412.328700][T15017] loop7: detected capacity change from 0 to 764 [ 1412.360403][T15017] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 1412.367660][T15028] loop3: detected capacity change from 0 to 7 [ 1412.384132][T15030] ip6t_REJECT: ECHOREPLY is not supported [ 1412.416895][T15028] netlink: 516 bytes leftover after parsing attributes in process `syz.1.10663'. [ 1412.482392][T15036] lo speed is unknown, defaulting to 1000 [ 1412.497582][T15032] FAULT_INJECTION: forcing a failure. [ 1412.497582][T15032] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.525511][T15032] CPU: 0 UID: 0 PID: 15032 Comm: syz.7.10665 Tainted: G W syzkaller #0 PREEMPT(full) [ 1412.525582][T15032] Tainted: [W]=WARN [ 1412.525588][T15032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1412.525599][T15032] Call Trace: [ 1412.525606][T15032] [ 1412.525612][T15032] __dump_stack+0x1d/0x30 [ 1412.525637][T15032] dump_stack_lvl+0x95/0xd0 [ 1412.525675][T15032] dump_stack+0x15/0x1b [ 1412.525694][T15032] should_fail_ex+0x263/0x280 [ 1412.525715][T15032] should_failslab+0x8c/0xb0 [ 1412.525735][T15032] __kmalloc_noprof+0xb8/0x4e0 [ 1412.525834][T15032] ? io_cache_alloc_new+0x2a/0xb0 [ 1412.525858][T15032] io_cache_alloc_new+0x2a/0xb0 [ 1412.525894][T15032] io_msg_alloc_async+0xf9/0x190 [ 1412.525915][T15032] io_send_zc_prep+0x279/0x4d0 [ 1412.525936][T15032] io_submit_sqes+0x75a/0x1270 [ 1412.526026][T15032] __se_sys_io_uring_enter+0x1c9/0xf50 [ 1412.526118][T15032] ? __fget_files+0x184/0x1c0 [ 1412.526138][T15032] ? mutex_unlock+0x4e/0x90 [ 1412.526160][T15032] ? fput+0x8f/0xc0 [ 1412.526219][T15032] __x64_sys_io_uring_enter+0x78/0x90 [ 1412.526246][T15032] x64_sys_call+0x1e16/0x3020 [ 1412.526267][T15032] do_syscall_64+0x12c/0x370 [ 1412.526286][T15032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1412.526374][T15032] RIP: 0033:0x7f70b8f3c799 [ 1412.526422][T15032] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1412.526437][T15032] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1412.526455][T15032] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1412.526468][T15032] RDX: 0000000000000020 RSI: 0000000000004503 RDI: 0000000000000003 [ 1412.526480][T15032] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1412.526524][T15032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1412.526565][T15032] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1412.526582][T15032] [ 1412.731539][T13946] tipc: Subscription rejected, illegal request [ 1412.832664][T15001] netlink: 12 bytes leftover after parsing attributes in process `syz.8.10655'. [ 1412.914592][T15057] netlink: 24 bytes leftover after parsing attributes in process `syz.9.10675'. [ 1412.964204][T15064] netlink: 28 bytes leftover after parsing attributes in process `syz.9.10677'. [ 1413.008520][T15055] loop7: detected capacity change from 0 to 764 [ 1413.009968][T15068] netlink: 60 bytes leftover after parsing attributes in process `syz.9.10678'. [ 1413.032127][T15055] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 1413.077557][T15060] lo speed is unknown, defaulting to 1000 [ 1413.128963][T15060] chnl_net:caif_netlink_parms(): no params data found [ 1413.166086][T15060] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.173419][T15060] bridge0: port 1(bridge_slave_0) entered disabled state [ 1413.180908][T15060] bridge_slave_0: entered allmulticast mode [ 1413.187483][T15060] bridge_slave_0: entered promiscuous mode [ 1413.194264][T15060] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.201438][T15060] bridge0: port 2(bridge_slave_1) entered disabled state [ 1413.208693][T15060] bridge_slave_1: entered allmulticast mode [ 1413.215071][T15060] bridge_slave_1: entered promiscuous mode [ 1413.231228][T15060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1413.241419][T15060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1413.259245][T15060] team0: Port device team_slave_0 added [ 1413.265733][T15060] team0: Port device team_slave_1 added [ 1413.280206][T15060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1413.287174][T15060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1413.313194][T15060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1413.327829][T15060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1413.334838][T15060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1413.360949][T15060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1413.389570][T15060] hsr_slave_0: entered promiscuous mode [ 1413.395583][T15060] hsr_slave_1: entered promiscuous mode [ 1413.402692][T15060] debugfs: 'hsr0' already exists in 'hsr' [ 1413.408512][T15060] Cannot create hsr debugfs directory [ 1413.479799][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1413.492851][T15088] lo speed is unknown, defaulting to 1000 [ 1413.497844][T15060] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.505637][T15060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1413.513053][T15060] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.520106][T15060] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1413.593024][T15060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1413.610660][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 1413.628339][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 1413.648635][T15060] 8021q: adding VLAN 0 to HW filter on device team0 [ 1413.689350][T15060] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1413.700062][T15060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1413.779746][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.786827][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1413.795526][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.802724][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1413.867489][T15116] loop8: detected capacity change from 0 to 256 [ 1413.916540][T15116] FAT-fs (loop8): Directory bread(block 64) failed [ 1413.923235][T15116] FAT-fs (loop8): Directory bread(block 65) failed [ 1413.929945][T15116] FAT-fs (loop8): Directory bread(block 66) failed [ 1413.936623][T15116] FAT-fs (loop8): Directory bread(block 67) failed [ 1413.943283][T15116] FAT-fs (loop8): Directory bread(block 68) failed [ 1413.949942][T15116] FAT-fs (loop8): Directory bread(block 69) failed [ 1413.956472][T15116] FAT-fs (loop8): Directory bread(block 70) failed [ 1413.964060][T15116] FAT-fs (loop8): Directory bread(block 71) failed [ 1413.971044][T15116] FAT-fs (loop8): Directory bread(block 72) failed [ 1413.977612][T15116] FAT-fs (loop8): Directory bread(block 73) failed [ 1414.049531][T15119] loop7: detected capacity change from 0 to 512 [ 1414.058457][T15119] EXT4-fs (loop7): can't mount with data=, fs mounted w/o journal [ 1414.178704][T15060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1414.464052][T15124] loop9: detected capacity change from 0 to 764 [ 1414.564790][T15124] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 1414.701495][T15060] veth0_vlan: entered promiscuous mode [ 1414.743458][T15060] veth1_vlan: entered promiscuous mode [ 1414.955591][T15060] veth0_macvtap: entered promiscuous mode [ 1414.963862][T15060] veth1_macvtap: entered promiscuous mode [ 1414.998566][T15060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1415.009277][T15060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1416.187658][T15162] loop9: detected capacity change from 0 to 128 [ 1416.207852][T15162] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 1416.220320][T15162] ext4 filesystem being mounted at /77/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1416.252262][T13726] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1416.869359][T15173] lo speed is unknown, defaulting to 1000 [ 1416.906726][T15175] sctp: [Deprecated]: syz.0.10700 (pid 15175) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1416.906726][T15175] Use struct sctp_sack_info instead [ 1417.329314][T15195] 9pnet_virtio: no channels available for device ÷˙˙˙nodes=1, [ 1417.390210][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 1417.390231][ T28] audit: type=1400 audit(2000001267.674:5074): avc: denied { compute_member } for pid=15194 comm="syz.9.10707" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1417.809577][T15206] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10710'. [ 1417.833390][T15210] netlink: 32 bytes leftover after parsing attributes in process `syz.1.10712'. [ 1417.842667][T15210] netlink: 32 bytes leftover after parsing attributes in process `syz.1.10712'. [ 1417.909800][T15211] loop8: detected capacity change from 0 to 256 [ 1417.940479][T15211] FAT-fs (loop8): Directory bread(block 64) failed [ 1417.947047][T15211] FAT-fs (loop8): Directory bread(block 65) failed [ 1417.953667][T15211] FAT-fs (loop8): Directory bread(block 66) failed [ 1417.960305][T15211] FAT-fs (loop8): Directory bread(block 67) failed [ 1417.966992][T15211] FAT-fs (loop8): Directory bread(block 68) failed [ 1417.973512][T15211] FAT-fs (loop8): Directory bread(block 69) failed [ 1417.980223][T15211] FAT-fs (loop8): Directory bread(block 70) failed [ 1417.986728][T15211] FAT-fs (loop8): Directory bread(block 71) failed [ 1417.993365][T15211] FAT-fs (loop8): Directory bread(block 72) failed [ 1417.999955][T15211] FAT-fs (loop8): Directory bread(block 73) failed [ 1418.130392][T15211] bridge_slave_0: left allmulticast mode [ 1418.136554][T15211] bridge_slave_0: left promiscuous mode [ 1418.143814][T15211] bridge0: port 1(bridge_slave_0) entered disabled state [ 1418.282616][T15211] bridge_slave_1: left allmulticast mode [ 1418.288916][T15211] bridge_slave_1: left promiscuous mode [ 1418.296061][T15211] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.326531][T15211] bond0: (slave bond_slave_0): Releasing backup interface [ 1418.359100][T15211] bond0: (slave bond_slave_1): Releasing backup interface [ 1418.406525][T15211] team0: Port device team_slave_0 removed [ 1418.437953][T15211] team0: Port device team_slave_1 removed [ 1418.452008][T15211] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1418.459875][T15211] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1418.479446][T15211] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1418.487109][T15211] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1418.531788][T15211] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1418.788261][T15216] lo speed is unknown, defaulting to 1000 [ 1418.913196][ T28] audit: type=1326 audit(2000001269.194:5075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15224 comm="syz.0.10716" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa52729c799 code=0x0 [ 1419.005394][T15227] netlink: 'syz.1.10715': attribute type 13 has an invalid length. [ 1419.039940][ T28] audit: type=1326 audit(2000001269.224:5076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1419.082622][ T28] audit: type=1326 audit(2000001269.224:5077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1419.106855][ T28] audit: type=1326 audit(2000001269.224:5078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1419.158082][ T28] audit: type=1326 audit(2000001269.224:5079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1419.181917][ T28] audit: type=1326 audit(2000001269.224:5080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1419.209535][ T28] audit: type=1326 audit(2000001269.234:5081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fd5084cc502 code=0x7ffc0000 [ 1419.233144][ T28] audit: type=1326 audit(2000001269.234:5082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fd5084cc502 code=0x7ffc0000 [ 1419.397611][ T28] audit: type=1326 audit(2000001269.234:5083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15226 comm="syz.1.10715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1420.929968][T15321] netlink: 16 bytes leftover after parsing attributes in process `syz.0.10744'. [ 1420.954064][T15321] bond1 (unregistering): Released all slaves [ 1420.960917][T15316] loop9: detected capacity change from 0 to 512 [ 1420.971969][T15316] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 1421.000469][T15316] EXT4-fs (loop9): 1 truncate cleaned up [ 1421.014263][T15316] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1421.056206][T15329] loop8: detected capacity change from 0 to 512 [ 1421.076183][T15329] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 1421.112493][T15333] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10747'. [ 1421.125687][T15333] netlink: 372 bytes leftover after parsing attributes in process `syz.0.10747'. [ 1421.151643][T15329] EXT4-fs (loop8): 1 truncate cleaned up [ 1421.189908][T15329] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1421.221860][T15329] FAULT_INJECTION: forcing a failure. [ 1421.221860][T15329] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.244680][T15329] CPU: 1 UID: 0 PID: 15329 Comm: syz.8.10746 Tainted: G W syzkaller #0 PREEMPT(full) [ 1421.244713][T15329] Tainted: [W]=WARN [ 1421.244719][T15329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1421.244731][T15329] Call Trace: [ 1421.244738][T15329] [ 1421.244745][T15329] __dump_stack+0x1d/0x30 [ 1421.244772][T15329] dump_stack_lvl+0x95/0xd0 [ 1421.244794][T15329] dump_stack+0x15/0x1b [ 1421.244815][T15329] should_fail_ex+0x263/0x280 [ 1421.244838][T15329] should_failslab+0x8c/0xb0 [ 1421.244859][T15329] kmem_cache_alloc_noprof+0x66/0x400 [ 1421.244881][T15329] ? vm_area_dup+0x33/0x2c0 [ 1421.244904][T15329] vm_area_dup+0x33/0x2c0 [ 1421.244926][T15329] __split_vma+0xe9/0x640 [ 1421.244947][T15329] ? mas_find+0x5d5/0x700 [ 1421.244964][T15329] vms_gather_munmap_vmas+0x2bc/0x850 [ 1421.244997][T15329] mmap_region+0x718/0x2050 [ 1421.245014][T15329] ? __rcu_read_unlock+0x4e/0x70 [ 1421.245033][T15329] ? __perf_event_task_sched_in+0xa65/0xad0 [ 1421.245070][T15329] do_mmap+0x9b2/0xbd0 [ 1421.245093][T15329] ? __pfx___tsan_read8+0x10/0x10 [ 1421.245112][T15329] vm_mmap_pgoff+0x183/0x2d0 [ 1421.245135][T15329] ksys_mmap_pgoff+0x267/0x310 [ 1421.245156][T15329] x64_sys_call+0x14df/0x3020 [ 1421.245176][T15329] do_syscall_64+0x12c/0x370 [ 1421.245194][T15329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1421.245212][T15329] RIP: 0033:0x7f17d1f3c799 [ 1421.245235][T15329] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1421.245251][T15329] RSP: 002b:00007f17d098f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1421.245269][T15329] RAX: ffffffffffffffda RBX: 00007f17d21b5fa0 RCX: 00007f17d1f3c799 [ 1421.245281][T15329] RDX: 00000000027ffff7 RSI: 0000000000600000 RDI: 0000200000000000 [ 1421.245293][T15329] RBP: 00007f17d098f090 R08: 000000000000000a R09: 0000000000002000 [ 1421.245305][T15329] R10: 0000000004012011 R11: 0000000000000246 R12: 0000000000000001 [ 1421.245316][T15329] R13: 00007f17d21b6038 R14: 00007f17d21b5fa0 R15: 00007ffc20fea218 [ 1421.245332][T15329] [ 1421.464856][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1421.519430][T13726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1421.548464][T15346] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10752'. [ 1424.088389][T15363] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1424.627755][T15378] loop9: detected capacity change from 0 to 2048 [ 1425.123939][T15368] bridge_slave_0: left allmulticast mode [ 1425.130361][T15368] bridge_slave_0: left promiscuous mode [ 1425.137343][T15368] bridge0: port 1(bridge_slave_0) entered disabled state [ 1425.797443][ T28] kauditd_printk_skb: 171 callbacks suppressed [ 1425.797458][ T28] audit: type=1400 audit(2000001276.084:5255): avc: denied { append } for pid=15375 comm="syz.9.10760" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1426.650343][T15368] bridge_slave_1: left allmulticast mode [ 1426.656598][T15368] bridge_slave_1: left promiscuous mode [ 1426.664282][T15368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1426.742516][T15368] bond0: (slave bond_slave_0): Releasing backup interface [ 1426.778847][T15368] bond0: (slave bond_slave_1): Releasing backup interface [ 1426.810658][T15368] team0: Port device team_slave_0 removed [ 1426.831494][T15368] team0: Port device team_slave_1 removed [ 1426.843591][T15368] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1426.851408][T15368] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1426.869341][T15368] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1426.877041][T15368] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1426.908737][T15368] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1426.959071][T15401] loop8: detected capacity change from 0 to 1024 [ 1426.965977][T15401] ext4: Unknown parameter 'nouser_xattr' [ 1426.994504][T15401] openvswitch: netlink: Key 23 has unexpected len 4 expected 2 [ 1427.023348][T15401] lo speed is unknown, defaulting to 1000 [ 1427.148027][T15406] loop9: detected capacity change from 0 to 128 [ 1427.170103][T15412] lo speed is unknown, defaulting to 1000 [ 1427.176984][T15413] netlink: 16 bytes leftover after parsing attributes in process `syz.0.10770'. [ 1427.199130][T15406] netlink: 104 bytes leftover after parsing attributes in process `syz.9.10768'. [ 1427.295760][T15416] batman_adv: batadv0: Adding interface: dummy0 [ 1427.302831][T15416] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1427.337526][T15416] batman_adv: batadv0: Interface activated: dummy0 [ 1427.373900][T15406] bio_check_eod: 10 callbacks suppressed [ 1427.373923][T15406] syz.9.10768: attempt to access beyond end of device [ 1427.373923][T15406] loop9: rw=2049, sector=138, nr_sectors = 8 limit=128 [ 1427.431884][T15426] FAULT_INJECTION: forcing a failure. [ 1427.431884][T15426] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.460075][T15426] CPU: 0 UID: 0 PID: 15426 Comm: syz.0.10774 Tainted: G W syzkaller #0 PREEMPT(full) [ 1427.460109][T15426] Tainted: [W]=WARN [ 1427.460116][T15426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1427.460128][T15426] Call Trace: [ 1427.460135][T15426] [ 1427.460142][T15426] __dump_stack+0x1d/0x30 [ 1427.460174][T15426] dump_stack_lvl+0x95/0xd0 [ 1427.460194][T15426] dump_stack+0x15/0x1b [ 1427.460214][T15426] should_fail_ex+0x263/0x280 [ 1427.460240][T15426] should_failslab+0x8c/0xb0 [ 1427.460298][T15426] __kvmalloc_node_noprof+0x155/0x650 [ 1427.460323][T15426] ? xt_alloc_table_info+0x40/0x80 [ 1427.460350][T15426] xt_alloc_table_info+0x40/0x80 [ 1427.460394][T15426] do_ipt_set_ctl+0x5dc/0x8e0 [ 1427.460417][T15426] ? _raw_spin_unlock_bh+0x18/0x20 [ 1427.460519][T15426] ? _raw_spin_lock_bh+0x56/0xb0 [ 1427.460542][T15426] nf_setsockopt+0x199/0x1b0 [ 1427.460637][T15426] ip_setsockopt+0x102/0x110 [ 1427.460733][T15426] udp_setsockopt+0x99/0xb0 [ 1427.460751][T15426] sock_common_setsockopt+0x69/0x80 [ 1427.460770][T15426] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1427.460834][T15426] __sys_setsockopt+0x184/0x200 [ 1427.460859][T15426] __x64_sys_setsockopt+0x64/0x80 [ 1427.460881][T15426] x64_sys_call+0x2327/0x3020 [ 1427.460928][T15426] do_syscall_64+0x12c/0x370 [ 1427.460946][T15426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1427.460965][T15426] RIP: 0033:0x7fa52729c799 [ 1427.460980][T15426] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1427.461014][T15426] RSP: 002b:00007fa525cf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1427.461035][T15426] RAX: ffffffffffffffda RBX: 00007fa527515fa0 RCX: 00007fa52729c799 [ 1427.461046][T15426] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 1427.461060][T15426] RBP: 00007fa525cf7090 R08: 00000000000002e8 R09: 0000000000000000 [ 1427.461074][T15426] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1427.461088][T15426] R13: 00007fa527516038 R14: 00007fa527515fa0 R15: 00007fff81399b08 [ 1427.461104][T15426] [ 1427.796682][T15432] lo speed is unknown, defaulting to 1000 [ 1427.819953][T15446] FAULT_INJECTION: forcing a failure. [ 1427.819953][T15446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1427.842609][T15446] CPU: 1 UID: 0 PID: 15446 Comm: syz.7.10781 Tainted: G W syzkaller #0 PREEMPT(full) [ 1427.842643][T15446] Tainted: [W]=WARN [ 1427.842650][T15446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1427.842662][T15446] Call Trace: [ 1427.842669][T15446] [ 1427.842675][T15446] __dump_stack+0x1d/0x30 [ 1427.842696][T15446] dump_stack_lvl+0x95/0xd0 [ 1427.842801][T15446] dump_stack+0x15/0x1b [ 1427.842819][T15446] should_fail_ex+0x263/0x280 [ 1427.842918][T15446] should_fail+0xb/0x20 [ 1427.842937][T15446] should_fail_usercopy+0x1a/0x20 [ 1427.842974][T15446] _copy_from_user+0x1c/0xb0 [ 1427.843051][T15446] kstrtouint_from_user+0x69/0xf0 [ 1427.843071][T15446] proc_fail_nth_write+0x50/0x160 [ 1427.843100][T15446] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1427.843193][T15446] vfs_write+0x269/0x9f0 [ 1427.843219][T15446] ? __rcu_read_unlock+0x4e/0x70 [ 1427.843291][T15446] ? __fget_files+0x184/0x1c0 [ 1427.843315][T15446] ? mutex_lock+0x57/0x90 [ 1427.843412][T15446] ksys_write+0xdc/0x1a0 [ 1427.843430][T15446] __x64_sys_write+0x40/0x50 [ 1427.843445][T15446] x64_sys_call+0x27e1/0x3020 [ 1427.843470][T15446] do_syscall_64+0x12c/0x370 [ 1427.843492][T15446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1427.843546][T15446] RIP: 0033:0x7f70b8efcfce [ 1427.843568][T15446] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1427.843585][T15446] RSP: 002b:00007f70b798efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1427.843602][T15446] RAX: ffffffffffffffda RBX: 00007f70b798f6c0 RCX: 00007f70b8efcfce [ 1427.843687][T15446] RDX: 0000000000000001 RSI: 00007f70b798f0a0 RDI: 0000000000000004 [ 1427.843700][T15446] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1427.843714][T15446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1427.843725][T15446] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1427.843741][T15446] [ 1428.044085][T15447] siw: device registration error -23 [ 1428.056121][T15447] loop8: detected capacity change from 0 to 512 [ 1428.238776][ T28] audit: type=1400 audit(2000001278.504:5256): avc: denied { read } for pid=15433 comm="syz.8.10778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1428.351291][ T28] audit: type=1326 audit(2000001278.634:5257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.389488][ T28] audit: type=1326 audit(2000001278.634:5258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.404714][T15454] loop7: detected capacity change from 0 to 1024 [ 1428.463348][ T28] audit: type=1326 audit(2000001278.634:5259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.491073][ T28] audit: type=1326 audit(2000001278.634:5260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.640570][ T28] audit: type=1326 audit(2000001278.634:5261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.735522][T15454] EXT4-fs (loop7): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1428.768380][ T28] audit: type=1326 audit(2000001278.634:5262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.813181][T15454] ext4 filesystem being mounted at /307/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1428.910091][ T28] audit: type=1326 audit(2000001278.634:5263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1428.928405][T15454] EXT4-fs (loop7): shut down requested (0) [ 1428.970994][ T28] audit: type=1326 audit(2000001278.634:5264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15463 comm="syz.1.10787" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fd5084cc799 code=0x7ffc0000 [ 1429.051902][ T8768] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 1429.274501][T15518] FAULT_INJECTION: forcing a failure. [ 1429.274501][T15518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1429.288937][T15518] CPU: 0 UID: 0 PID: 15518 Comm: syz.0.10805 Tainted: G W syzkaller #0 PREEMPT(full) [ 1429.289040][T15518] Tainted: [W]=WARN [ 1429.289046][T15518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1429.289068][T15518] Call Trace: [ 1429.289074][T15518] [ 1429.289081][T15518] __dump_stack+0x1d/0x30 [ 1429.289104][T15518] dump_stack_lvl+0x95/0xd0 [ 1429.289129][T15518] dump_stack+0x15/0x1b [ 1429.289151][T15518] should_fail_ex+0x263/0x280 [ 1429.289245][T15518] should_fail+0xb/0x20 [ 1429.289261][T15518] should_fail_usercopy+0x1a/0x20 [ 1429.289281][T15518] _copy_from_user+0x1c/0xb0 [ 1429.289310][T15518] do_semtimedop+0x152/0x220 [ 1429.289374][T15518] __x64_sys_semtimedop+0xc8/0xf0 [ 1429.289468][T15518] x64_sys_call+0x2e5e/0x3020 [ 1429.289490][T15518] do_syscall_64+0x12c/0x370 [ 1429.289550][T15518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1429.289570][T15518] RIP: 0033:0x7fa52729c799 [ 1429.289654][T15518] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1429.289679][T15518] RSP: 002b:00007fa525cf7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000dc [ 1429.289703][T15518] RAX: ffffffffffffffda RBX: 00007fa527515fa0 RCX: 00007fa52729c799 [ 1429.289716][T15518] RDX: 0000000000000001 RSI: 0000200000000100 RDI: 0000000000000000 [ 1429.289727][T15518] RBP: 00007fa525cf7090 R08: 0000000000000000 R09: 0000000000000000 [ 1429.289737][T15518] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 1429.289824][T15518] R13: 00007fa527516038 R14: 00007fa527515fa0 R15: 00007fff81399b08 [ 1429.289844][T15518] [ 1429.466753][T15521] netlink: 116376 bytes leftover after parsing attributes in process `syz.0.10806'. [ 1429.476293][T15521] netlink: zone id is out of range [ 1429.481459][T15521] netlink: zone id is out of range [ 1429.486613][T15521] netlink: zone id is out of range [ 1429.492044][T15521] netlink: zone id is out of range [ 1429.803687][T15539] netlink: 44 bytes leftover after parsing attributes in process `syz.1.10813'. [ 1429.813007][T15539] netlink: 44 bytes leftover after parsing attributes in process `syz.1.10813'. [ 1429.826137][T15539] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1429.834682][T15539] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1430.056517][T15551] FAULT_INJECTION: forcing a failure. [ 1430.056517][T15551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1430.069808][T15551] CPU: 0 UID: 0 PID: 15551 Comm: syz.7.10817 Tainted: G W syzkaller #0 PREEMPT(full) [ 1430.069836][T15551] Tainted: [W]=WARN [ 1430.069844][T15551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1430.069857][T15551] Call Trace: [ 1430.069866][T15551] [ 1430.069874][T15551] __dump_stack+0x1d/0x30 [ 1430.069901][T15551] dump_stack_lvl+0x95/0xd0 [ 1430.069964][T15551] dump_stack+0x15/0x1b [ 1430.069987][T15551] should_fail_ex+0x263/0x280 [ 1430.070008][T15551] should_fail+0xb/0x20 [ 1430.070039][T15551] should_fail_usercopy+0x1a/0x20 [ 1430.070063][T15551] _copy_from_user+0x1c/0xb0 [ 1430.070087][T15551] do_semtimedop+0x152/0x220 [ 1430.070119][T15551] __x64_sys_semtimedop+0xc8/0xf0 [ 1430.070213][T15551] x64_sys_call+0x2e5e/0x3020 [ 1430.070235][T15551] do_syscall_64+0x12c/0x370 [ 1430.070254][T15551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1430.070273][T15551] RIP: 0033:0x7f70b8f3c799 [ 1430.070311][T15551] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1430.070328][T15551] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000dc [ 1430.070349][T15551] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1430.070364][T15551] RDX: 0000000000000002 RSI: 0000200000000100 RDI: 0000000000000000 [ 1430.070408][T15551] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1430.070419][T15551] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 1430.070430][T15551] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1430.070446][T15551] [ 1430.401853][T15561] loop9: detected capacity change from 0 to 512 [ 1430.425138][T15561] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1430.438094][T15561] ext4 filesystem being mounted at /104/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1430.454329][T15561] netlink: 'syz.9.10822': attribute type 13 has an invalid length. [ 1430.485025][T13726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1430.574895][T15570] loop9: detected capacity change from 0 to 512 [ 1430.598986][T15570] EXT4-fs (loop9): mounting ext3 file system using the ext4 subsystem [ 1430.599232][T15570] EXT4-fs error (device loop9): ext4_get_journal_inode:5863: comm syz.9.10825: inode #1792: comm syz.9.10825: iget: illegal inode # [ 1430.599260][T15570] loop9: lost filesystem error report for type 5 error -117 [ 1430.599431][T15570] EXT4-fs (loop9): Remounting filesystem read-only [ 1430.599446][T15570] EXT4-fs (loop9): no journal found [ 1430.599458][T15570] EXT4-fs (loop9): can't get journal size [ 1430.600846][T15570] EXT4-fs (loop9): warning: mounting fs with errors, running e2fsck is recommended [ 1430.601434][T15570] EXT4-fs (loop9): failed to initialize system zone (-22) [ 1430.601519][T15570] EXT4-fs (loop9): mount failed [ 1430.768546][T15578] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10828'. [ 1430.948516][T23859] IPVS: starting estimator thread 0... [ 1431.067439][T15585] IPVS: using max 2400 ests per chain, 120000 per kthread [ 1431.609173][ T28] kauditd_printk_skb: 124 callbacks suppressed [ 1431.609186][ T28] audit: type=1400 audit(2000001281.894:5389): avc: denied { accept } for pid=15596 comm="syz.7.10834" path="socket:[151636]" dev="sockfs" ino=151636 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1431.662002][T15597] usb usb7: usbfs: process 15597 (syz.7.10834) did not claim interface 0 before use [ 1431.884842][T15602] FAULT_INJECTION: forcing a failure. [ 1431.884842][T15602] name failslab, interval 1, probability 0, space 0, times 0 [ 1431.924403][T15602] CPU: 0 UID: 0 PID: 15602 Comm: syz.7.10836 Tainted: G W syzkaller #0 PREEMPT(full) [ 1431.924437][T15602] Tainted: [W]=WARN [ 1431.924445][T15602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1431.924471][T15602] Call Trace: [ 1431.924478][T15602] [ 1431.924487][T15602] __dump_stack+0x1d/0x30 [ 1431.924514][T15602] dump_stack_lvl+0x95/0xd0 [ 1431.924534][T15602] dump_stack+0x15/0x1b [ 1431.924619][T15602] should_fail_ex+0x263/0x280 [ 1431.924639][T15602] should_failslab+0x8c/0xb0 [ 1431.924657][T15602] __kvmalloc_node_noprof+0x155/0x650 [ 1431.924679][T15602] ? file_tty_write+0x1a3/0x690 [ 1431.924699][T15602] ? mutex_trylock+0x81/0xc0 [ 1431.924732][T15602] file_tty_write+0x1a3/0x690 [ 1431.924750][T15602] ? __pfx_tty_write+0x10/0x10 [ 1431.924766][T15602] tty_write+0x25/0x30 [ 1431.924781][T15602] vfs_write+0x5a6/0x9f0 [ 1431.924880][T15602] ksys_write+0xdc/0x1a0 [ 1431.924900][T15602] __x64_sys_write+0x40/0x50 [ 1431.924916][T15602] x64_sys_call+0x27e1/0x3020 [ 1431.924989][T15602] do_syscall_64+0x12c/0x370 [ 1431.925007][T15602] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1431.925068][T15602] RIP: 0033:0x7f70b8f3c799 [ 1431.925085][T15602] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1431.925103][T15602] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1431.925123][T15602] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1431.925164][T15602] RDX: 000000000000ff70 RSI: 0000200000000080 RDI: 0000000000000003 [ 1431.925177][T15602] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1431.925191][T15602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1431.925202][T15602] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1431.925218][T15602] [ 1432.595671][T15623] lo speed is unknown, defaulting to 1000 [ 1432.662612][T15624] siw: device registration error -23 [ 1432.668353][T15624] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10844'. [ 1432.725229][T15624] loop7: detected capacity change from 0 to 512 [ 1433.365317][T15648] netlink: 'syz.7.10852': attribute type 1 has an invalid length. [ 1433.380896][ T28] audit: type=1326 audit(2000001283.664:5390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.412369][ T28] audit: type=1326 audit(2000001283.664:5391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.436093][ T28] audit: type=1326 audit(2000001283.664:5392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.445964][T15650] netlink: 'syz.0.10851': attribute type 3 has an invalid length. [ 1433.460073][ T28] audit: type=1326 audit(2000001283.664:5393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.493000][T15650] netlink: 'syz.0.10851': attribute type 3 has an invalid length. [ 1433.523293][ T28] audit: type=1326 audit(2000001283.664:5394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.564365][ T28] audit: type=1326 audit(2000001283.684:5395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.588531][ T28] audit: type=1326 audit(2000001283.684:5396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.612424][ T28] audit: type=1326 audit(2000001283.684:5397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f70b8f3c799 code=0x7ffc0000 [ 1433.636519][ T28] audit: type=1326 audit(2000001283.684:5398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15647 comm="syz.7.10852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f70b8f3c502 code=0x7ffc0000 [ 1433.698026][T15652] FAULT_INJECTION: forcing a failure. [ 1433.698026][T15652] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.710911][T15652] CPU: 0 UID: 0 PID: 15652 Comm: syz.7.10853 Tainted: G W syzkaller #0 PREEMPT(full) [ 1433.711001][T15652] Tainted: [W]=WARN [ 1433.711008][T15652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1433.711019][T15652] Call Trace: [ 1433.711027][T15652] [ 1433.711036][T15652] __dump_stack+0x1d/0x30 [ 1433.711064][T15652] dump_stack_lvl+0x95/0xd0 [ 1433.711086][T15652] dump_stack+0x15/0x1b [ 1433.711140][T15652] should_fail_ex+0x263/0x280 [ 1433.711164][T15652] should_failslab+0x8c/0xb0 [ 1433.711191][T15652] __kmalloc_noprof+0xb8/0x4e0 [ 1433.711227][T15652] ? io_uring_alloc_async_data+0x46/0xa0 [ 1433.711249][T15652] ? __io_alloc_req_refill+0x141/0x1e0 [ 1433.711278][T15652] io_uring_alloc_async_data+0x46/0xa0 [ 1433.711297][T15652] io_waitid_prep+0xc6/0x180 [ 1433.711368][T15652] io_submit_sqes+0x75a/0x1270 [ 1433.711403][T15652] __se_sys_io_uring_enter+0x1c9/0xf50 [ 1433.711431][T15652] ? __fget_files+0x184/0x1c0 [ 1433.711483][T15652] ? mutex_unlock+0x4e/0x90 [ 1433.711506][T15652] ? fput+0x8f/0xc0 [ 1433.711526][T15652] __x64_sys_io_uring_enter+0x78/0x90 [ 1433.711589][T15652] x64_sys_call+0x1e16/0x3020 [ 1433.711616][T15652] do_syscall_64+0x12c/0x370 [ 1433.711638][T15652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1433.711713][T15652] RIP: 0033:0x7f70b8f3c799 [ 1433.711728][T15652] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1433.711777][T15652] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1433.711865][T15652] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1433.711878][T15652] RDX: 0000000001000000 RSI: 00000000200047bc RDI: 0000000000000003 [ 1433.711889][T15652] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 000000000000005e [ 1433.711910][T15652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1433.711924][T15652] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1433.711942][T15652] [ 1433.980213][T15654] loop7: detected capacity change from 0 to 164 [ 1433.990934][T15654] ISOFS: unable to read i-node block [ 1434.003896][T15654] iso9660: Corrupted directory entry in block 2 of inode 1792 [ 1434.012319][T15654] iso9660: Corrupted directory entry in block 2 of inode 1792 [ 1434.083143][T15658] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10856'. [ 1434.169831][T15664] netlink: 'syz.1.10859': attribute type 13 has an invalid length. [ 1434.317233][T15669] FAULT_INJECTION: forcing a failure. [ 1434.317233][T15669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1434.336537][T15669] CPU: 0 UID: 0 PID: 15669 Comm: syz.7.10861 Tainted: G W syzkaller #0 PREEMPT(full) [ 1434.336565][T15669] Tainted: [W]=WARN [ 1434.336571][T15669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1434.336583][T15669] Call Trace: [ 1434.336638][T15669] [ 1434.336645][T15669] __dump_stack+0x1d/0x30 [ 1434.336670][T15669] dump_stack_lvl+0x95/0xd0 [ 1434.336693][T15669] dump_stack+0x15/0x1b [ 1434.336780][T15669] should_fail_ex+0x263/0x280 [ 1434.336801][T15669] should_fail+0xb/0x20 [ 1434.336817][T15669] should_fail_usercopy+0x1a/0x20 [ 1434.336883][T15669] _copy_to_user+0x20/0xa0 [ 1434.336905][T15669] simple_read_from_buffer+0xb5/0x130 [ 1434.336928][T15669] proc_fail_nth_read+0x10e/0x150 [ 1434.336979][T15669] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1434.337008][T15669] vfs_read+0x1ab/0x7f0 [ 1434.337061][T15669] ? mutex_lock+0x35/0x90 [ 1434.337086][T15669] ? __tsan_unaligned_write8+0x24/0x180 [ 1434.337105][T15669] ? mutex_lock+0x57/0x90 [ 1434.337128][T15669] ksys_read+0xdc/0x1a0 [ 1434.337200][T15669] __x64_sys_read+0x40/0x50 [ 1434.337259][T15669] x64_sys_call+0x2886/0x3020 [ 1434.337282][T15669] do_syscall_64+0x12c/0x370 [ 1434.337302][T15669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1434.337372][T15669] RIP: 0033:0x7f70b8efcfce [ 1434.337385][T15669] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1434.337400][T15669] RSP: 002b:00007f70b798efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1434.337438][T15669] RAX: ffffffffffffffda RBX: 00007f70b798f6c0 RCX: 00007f70b8efcfce [ 1434.337450][T15669] RDX: 000000000000000f RSI: 00007f70b798f0a0 RDI: 000000000000000c [ 1434.337522][T15669] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1434.337535][T15669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1434.337566][T15669] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1434.337584][T15669] [ 1434.608863][T15678] loop7: detected capacity change from 0 to 512 [ 1434.641472][T15678] EXT4-fs error (device loop7): ext4_iget_extra_inode:5025: inode #17: comm syz.7.10865: corrupted in-inode xattr: invalid ea_ino [ 1434.681130][T15678] loop7: lost file I/O error report for ino 17 type 5 pos 0x0 len 0x0 error -117 [ 1434.681273][T15678] EXT4-fs error (device loop7): ext4_orphan_get:1396: comm syz.7.10865: couldn't read orphan inode 17 (err -117) [ 1434.690496][ C1] EXT4-fs (loop7): error count since last fsck: 1 [ 1434.690511][ C1] EXT4-fs (loop7): initial error at time 2000001284: ext4_iget_extra_inode:5025: inode 17 [ 1434.690545][ C1] EXT4-fs (loop7): last error at time 2000001284: ext4_iget_extra_inode:5025: inode 17 [ 1434.729532][T15678] loop7: lost filesystem error report for type 5 error -117 [ 1434.729985][T15678] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1434.776579][ T8768] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1434.955920][T15696] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10869'. [ 1435.208392][T15700] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10871'. [ 1435.279180][T15704] loop8: detected capacity change from 0 to 512 [ 1435.345096][T15704] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1435.364219][T15704] ext4 filesystem being mounted at /75/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1435.393201][T15704] netlink: 'syz.8.10872': attribute type 13 has an invalid length. [ 1435.449952][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1435.529152][T15710] netlink: 56 bytes leftover after parsing attributes in process `syz.7.10870'. [ 1435.804391][T15719] loop8: detected capacity change from 0 to 512 [ 1435.824761][T15719] EXT4-fs error (device loop8): ext4_iget_extra_inode:5025: inode #17: comm syz.8.10877: corrupted in-inode xattr: invalid ea_ino [ 1435.859717][T15719] loop8: lost file I/O error report for ino 17 type 5 pos 0x0 len 0x0 error -117 [ 1435.859877][T15719] EXT4-fs error (device loop8): ext4_orphan_get:1396: comm syz.8.10877: couldn't read orphan inode 17 (err -117) [ 1435.869107][ C0] EXT4-fs (loop8): error count since last fsck: 1 [ 1435.869123][ C0] EXT4-fs (loop8): initial error at time 2000001286: ext4_iget_extra_inode:5025: inode 17 [ 1435.869178][ C0] EXT4-fs (loop8): last error at time 2000001286: ext4_iget_extra_inode:5025: inode 17 [ 1435.941497][T15719] loop8: lost filesystem error report for type 5 error -117 [ 1435.958478][T15719] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1435.969947][T15725] FAULT_INJECTION: forcing a failure. [ 1435.969947][T15725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1436.021689][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1436.037351][T15725] CPU: 0 UID: 0 PID: 15725 Comm: syz.1.10879 Tainted: G W syzkaller #0 PREEMPT(full) [ 1436.037399][T15725] Tainted: [W]=WARN [ 1436.037406][T15725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1436.037418][T15725] Call Trace: [ 1436.037424][T15725] [ 1436.037431][T15725] __dump_stack+0x1d/0x30 [ 1436.037457][T15725] dump_stack_lvl+0x95/0xd0 [ 1436.037522][T15725] dump_stack+0x15/0x1b [ 1436.037541][T15725] should_fail_ex+0x263/0x280 [ 1436.037565][T15725] should_fail+0xb/0x20 [ 1436.037594][T15725] should_fail_usercopy+0x1a/0x20 [ 1436.037660][T15725] _copy_to_user+0x20/0xa0 [ 1436.037688][T15725] simple_read_from_buffer+0xb5/0x130 [ 1436.037708][T15725] proc_fail_nth_read+0x10e/0x150 [ 1436.037742][T15725] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1436.037859][T15725] vfs_read+0x1ab/0x7f0 [ 1436.037918][T15725] ? __rcu_read_unlock+0x4e/0x70 [ 1436.037939][T15725] ? __fget_files+0x184/0x1c0 [ 1436.037961][T15725] ? mutex_lock+0x57/0x90 [ 1436.037999][T15725] ksys_read+0xdc/0x1a0 [ 1436.038023][T15725] __x64_sys_read+0x40/0x50 [ 1436.038037][T15725] x64_sys_call+0x2886/0x3020 [ 1436.038148][T15725] do_syscall_64+0x12c/0x370 [ 1436.038208][T15725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1436.038282][T15725] RIP: 0033:0x7fd50848cfce [ 1436.038295][T15725] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1436.038386][T15725] RSP: 002b:00007fd506f26fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1436.038473][T15725] RAX: ffffffffffffffda RBX: 00007fd506f276c0 RCX: 00007fd50848cfce [ 1436.038488][T15725] RDX: 000000000000000f RSI: 00007fd506f270a0 RDI: 0000000000000004 [ 1436.038548][T15725] RBP: 00007fd506f27090 R08: 0000000000000000 R09: 0000000000000000 [ 1436.038640][T15725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1436.038651][T15725] R13: 00007fd508746038 R14: 00007fd508745fa0 R15: 00007ffd8c579f98 [ 1436.038732][T15725] [ 1436.322882][T15731] netlink: 328 bytes leftover after parsing attributes in process `syz.1.10883'. [ 1436.344691][T15731] netlink: 36 bytes leftover after parsing attributes in process `syz.1.10883'. [ 1436.628122][T15736] loop8: detected capacity change from 0 to 1024 [ 1436.687372][T15744] tap0: tun_chr_ioctl cmd 2147767521 [ 1436.697603][T15744] FAULT_INJECTION: forcing a failure. [ 1436.697603][T15744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1436.787223][T15744] CPU: 1 UID: 0 PID: 15744 Comm: syz.8.10886 Tainted: G W syzkaller #0 PREEMPT(full) [ 1436.787257][T15744] Tainted: [W]=WARN [ 1436.787264][T15744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1436.787276][T15744] Call Trace: [ 1436.787284][T15744] [ 1436.787292][T15744] __dump_stack+0x1d/0x30 [ 1436.787400][T15744] dump_stack_lvl+0x95/0xd0 [ 1436.787423][T15744] dump_stack+0x15/0x1b [ 1436.787445][T15744] should_fail_ex+0x263/0x280 [ 1436.787469][T15744] should_fail+0xb/0x20 [ 1436.787511][T15744] should_fail_usercopy+0x1a/0x20 [ 1436.787536][T15744] _copy_to_user+0x20/0xa0 [ 1436.787565][T15744] simple_read_from_buffer+0xb5/0x130 [ 1436.787585][T15744] proc_fail_nth_read+0x10e/0x150 [ 1436.787679][T15744] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1436.787711][T15744] vfs_read+0x1ab/0x7f0 [ 1436.787770][T15744] ? __rcu_read_unlock+0x4e/0x70 [ 1436.787823][T15744] ? __fget_files+0x184/0x1c0 [ 1436.787930][T15744] ? mutex_lock+0x57/0x90 [ 1436.787958][T15744] ksys_read+0xdc/0x1a0 [ 1436.787992][T15744] __x64_sys_read+0x40/0x50 [ 1436.788009][T15744] x64_sys_call+0x2886/0x3020 [ 1436.788074][T15744] do_syscall_64+0x12c/0x370 [ 1436.788095][T15744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1436.788118][T15744] RIP: 0033:0x7f17d1efcfce [ 1436.788135][T15744] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1436.788250][T15744] RSP: 002b:00007f17d098efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1436.788267][T15744] RAX: ffffffffffffffda RBX: 00007f17d098f6c0 RCX: 00007f17d1efcfce [ 1436.788279][T15744] RDX: 000000000000000f RSI: 00007f17d098f0a0 RDI: 0000000000000004 [ 1436.788292][T15744] RBP: 00007f17d098f090 R08: 0000000000000000 R09: 0000000000000000 [ 1436.788306][T15744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1436.788326][T15744] R13: 00007f17d21b6038 R14: 00007f17d21b5fa0 R15: 00007ffc20fea218 [ 1436.788345][T15744] [ 1437.305038][T15761] FAULT_INJECTION: forcing a failure. [ 1437.305038][T15761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1437.319350][T15761] CPU: 0 UID: 0 PID: 15761 Comm: syz.7.10892 Tainted: G W syzkaller #0 PREEMPT(full) [ 1437.319482][T15761] Tainted: [W]=WARN [ 1437.319487][T15761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1437.319498][T15761] Call Trace: [ 1437.319503][T15761] [ 1437.319509][T15761] __dump_stack+0x1d/0x30 [ 1437.319536][T15761] dump_stack_lvl+0x95/0xd0 [ 1437.319607][T15761] dump_stack+0x15/0x1b [ 1437.319625][T15761] should_fail_ex+0x263/0x280 [ 1437.319645][T15761] should_fail+0xb/0x20 [ 1437.319724][T15761] should_fail_usercopy+0x1a/0x20 [ 1437.319755][T15761] _copy_to_user+0x20/0xa0 [ 1437.319782][T15761] simple_read_from_buffer+0xb5/0x130 [ 1437.319879][T15761] proc_fail_nth_read+0x10e/0x150 [ 1437.319907][T15761] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1437.319931][T15761] vfs_read+0x1ab/0x7f0 [ 1437.320013][T15761] ? __rcu_read_unlock+0x4e/0x70 [ 1437.320039][T15761] ? __fget_files+0x184/0x1c0 [ 1437.320063][T15761] ? mutex_lock+0x57/0x90 [ 1437.320158][T15761] ksys_read+0xdc/0x1a0 [ 1437.320188][T15761] __x64_sys_read+0x40/0x50 [ 1437.320204][T15761] x64_sys_call+0x2886/0x3020 [ 1437.320281][T15761] do_syscall_64+0x12c/0x370 [ 1437.320300][T15761] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1437.320318][T15761] RIP: 0033:0x7f70b8efcfce [ 1437.320333][T15761] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1437.320433][T15761] RSP: 002b:00007f70b798efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1437.320450][T15761] RAX: ffffffffffffffda RBX: 00007f70b798f6c0 RCX: 00007f70b8efcfce [ 1437.320463][T15761] RDX: 000000000000000f RSI: 00007f70b798f0a0 RDI: 0000000000000004 [ 1437.320473][T15761] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1437.320515][T15761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1437.320528][T15761] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1437.320588][T15761] [ 1437.570828][T15766] FAULT_INJECTION: forcing a failure. [ 1437.570828][T15766] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.584234][T15766] CPU: 0 UID: 0 PID: 15766 Comm: syz.0.10893 Tainted: G W syzkaller #0 PREEMPT(full) [ 1437.584291][T15766] Tainted: [W]=WARN [ 1437.584297][T15766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1437.584308][T15766] Call Trace: [ 1437.584313][T15766] [ 1437.584320][T15766] __dump_stack+0x1d/0x30 [ 1437.584344][T15766] dump_stack_lvl+0x95/0xd0 [ 1437.584432][T15766] dump_stack+0x15/0x1b [ 1437.584449][T15766] should_fail_ex+0x263/0x280 [ 1437.584471][T15766] should_failslab+0x8c/0xb0 [ 1437.584492][T15766] __kmalloc_noprof+0xb8/0x4e0 [ 1437.584544][T15766] ? io_uring_alloc_async_data+0x46/0xa0 [ 1437.584567][T15766] ? __io_alloc_req_refill+0x141/0x1e0 [ 1437.584597][T15766] io_uring_alloc_async_data+0x46/0xa0 [ 1437.584666][T15766] io_waitid_prep+0xc6/0x180 [ 1437.584683][T15766] io_submit_sqes+0x75a/0x1270 [ 1437.584718][T15766] __se_sys_io_uring_enter+0x1c9/0xf50 [ 1437.584823][T15766] ? __fget_files+0x184/0x1c0 [ 1437.584848][T15766] ? mutex_unlock+0x4e/0x90 [ 1437.584881][T15766] ? fput+0x8f/0xc0 [ 1437.584906][T15766] __x64_sys_io_uring_enter+0x78/0x90 [ 1437.585015][T15766] x64_sys_call+0x1e16/0x3020 [ 1437.585035][T15766] do_syscall_64+0x12c/0x370 [ 1437.585053][T15766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1437.585129][T15766] RIP: 0033:0x7fa52729c799 [ 1437.585144][T15766] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1437.585197][T15766] RSP: 002b:00007fa525cf7028 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1437.585216][T15766] RAX: ffffffffffffffda RBX: 00007fa527515fa0 RCX: 00007fa52729c799 [ 1437.585295][T15766] RDX: 0000000001000000 RSI: 00000000200047bc RDI: 0000000000000003 [ 1437.585323][T15766] RBP: 00007fa525cf7090 R08: 0000000000000000 R09: 000000000000005e [ 1437.585348][T15766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1437.585357][T15766] R13: 00007fa527516038 R14: 00007fa527515fa0 R15: 00007fff81399b08 [ 1437.585372][T15766] [ 1437.962327][ T28] kauditd_printk_skb: 190 callbacks suppressed [ 1437.962343][ T28] audit: type=1326 audit(2000001288.244:5589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1437.966813][T15781] loop8: detected capacity change from 0 to 512 [ 1437.977386][ T28] audit: type=1326 audit(2000001288.244:5590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.067205][ T28] audit: type=1326 audit(2000001288.244:5591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.117247][ T28] audit: type=1326 audit(2000001288.244:5592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.161060][ T28] audit: type=1326 audit(2000001288.244:5593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.214995][ T28] audit: type=1326 audit(2000001288.244:5594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f17d1f3c502 code=0x7ffc0000 [ 1438.257168][ T28] audit: type=1326 audit(2000001288.244:5595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f17d1f3c502 code=0x7ffc0000 [ 1438.287283][ T28] audit: type=1326 audit(2000001288.244:5596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.331064][ T28] audit: type=1326 audit(2000001288.244:5597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.382762][ T28] audit: type=1326 audit(2000001288.244:5598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.8.10898" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17d1f3c799 code=0x7ffc0000 [ 1438.489575][T15781] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1438.517256][T15781] ext4 filesystem being mounted at /84/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1438.582304][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1438.616075][T15793] FAULT_INJECTION: forcing a failure. [ 1438.616075][T15793] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.663246][T15793] CPU: 1 UID: 0 PID: 15793 Comm: syz.0.10903 Tainted: G W syzkaller #0 PREEMPT(full) [ 1438.663274][T15793] Tainted: [W]=WARN [ 1438.663280][T15793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1438.663292][T15793] Call Trace: [ 1438.663299][T15793] [ 1438.663306][T15793] __dump_stack+0x1d/0x30 [ 1438.663356][T15793] dump_stack_lvl+0x95/0xd0 [ 1438.663412][T15793] dump_stack+0x15/0x1b [ 1438.663434][T15793] should_fail_ex+0x263/0x280 [ 1438.663455][T15793] should_failslab+0x8c/0xb0 [ 1438.663473][T15793] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 1438.663493][T15793] ? __alloc_skb+0x2d6/0x690 [ 1438.663561][T15793] __alloc_skb+0x2d6/0x690 [ 1438.663619][T15793] ? __alloc_skb+0x200/0x690 [ 1438.663645][T15793] netlink_alloc_large_skb+0xbf/0xf0 [ 1438.663669][T15793] netlink_sendmsg+0x40c/0x6f0 [ 1438.663696][T15793] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1438.663742][T15793] ____sys_sendmsg+0x563/0x5b0 [ 1438.663774][T15793] ___sys_sendmsg+0x195/0x1e0 [ 1438.663809][T15793] __x64_sys_sendmsg+0xd4/0x160 [ 1438.663840][T15793] x64_sys_call+0x194c/0x3020 [ 1438.663942][T15793] do_syscall_64+0x12c/0x370 [ 1438.664021][T15793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1438.664043][T15793] RIP: 0033:0x7fa52729c799 [ 1438.664065][T15793] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1438.664107][T15793] RSP: 002b:00007fa525cf7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1438.664124][T15793] RAX: ffffffffffffffda RBX: 00007fa527515fa0 RCX: 00007fa52729c799 [ 1438.664136][T15793] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1438.664148][T15793] RBP: 00007fa525cf7090 R08: 0000000000000000 R09: 0000000000000000 [ 1438.664162][T15793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1438.664175][T15793] R13: 00007fa527516038 R14: 00007fa527515fa0 R15: 00007fff81399b08 [ 1438.664218][T15793] [ 1438.902951][T15796] FAULT_INJECTION: forcing a failure. [ 1438.902951][T15796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1438.946062][T15796] CPU: 0 UID: 0 PID: 15796 Comm: syz.8.10904 Tainted: G W syzkaller #0 PREEMPT(full) [ 1438.946166][T15796] Tainted: [W]=WARN [ 1438.946173][T15796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1438.946186][T15796] Call Trace: [ 1438.946193][T15796] [ 1438.946199][T15796] __dump_stack+0x1d/0x30 [ 1438.946293][T15796] dump_stack_lvl+0x95/0xd0 [ 1438.946315][T15796] dump_stack+0x15/0x1b [ 1438.946387][T15796] should_fail_ex+0x263/0x280 [ 1438.946443][T15796] should_fail+0xb/0x20 [ 1438.946459][T15796] should_fail_usercopy+0x1a/0x20 [ 1438.946479][T15796] _copy_to_user+0x20/0xa0 [ 1438.946503][T15796] simple_read_from_buffer+0xb5/0x130 [ 1438.946649][T15796] proc_fail_nth_read+0x10e/0x150 [ 1438.946673][T15796] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1438.946755][T15796] vfs_read+0x1ab/0x7f0 [ 1438.946844][T15796] ? __rcu_read_unlock+0x4e/0x70 [ 1438.946871][T15796] ? __fget_files+0x184/0x1c0 [ 1438.946891][T15796] ? mutex_lock+0x57/0x90 [ 1438.946914][T15796] ksys_read+0xdc/0x1a0 [ 1438.946995][T15796] __x64_sys_read+0x40/0x50 [ 1438.947010][T15796] x64_sys_call+0x2886/0x3020 [ 1438.947053][T15796] do_syscall_64+0x12c/0x370 [ 1438.947070][T15796] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1438.947092][T15796] RIP: 0033:0x7f17d1efcfce [ 1438.947127][T15796] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1438.947141][T15796] RSP: 002b:00007f17d098efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1438.947159][T15796] RAX: ffffffffffffffda RBX: 00007f17d098f6c0 RCX: 00007f17d1efcfce [ 1438.947238][T15796] RDX: 000000000000000f RSI: 00007f17d098f0a0 RDI: 0000000000000007 [ 1438.947251][T15796] RBP: 00007f17d098f090 R08: 0000000000000000 R09: 0000000000000000 [ 1438.947263][T15796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1438.947273][T15796] R13: 00007f17d21b6038 R14: 00007f17d21b5fa0 R15: 00007ffc20fea218 [ 1438.947366][T15796] [ 1439.283355][T15816] FAULT_INJECTION: forcing a failure. [ 1439.283355][T15816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1439.301806][T15816] CPU: 1 UID: 0 PID: 15816 Comm: syz.7.10910 Tainted: G W syzkaller #0 PREEMPT(full) [ 1439.301836][T15816] Tainted: [W]=WARN [ 1439.301843][T15816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1439.301880][T15816] Call Trace: [ 1439.301887][T15816] [ 1439.301895][T15816] __dump_stack+0x1d/0x30 [ 1439.301918][T15816] dump_stack_lvl+0x95/0xd0 [ 1439.301936][T15816] dump_stack+0x15/0x1b [ 1439.302001][T15816] should_fail_ex+0x263/0x280 [ 1439.302021][T15816] should_fail+0xb/0x20 [ 1439.302080][T15816] should_fail_usercopy+0x1a/0x20 [ 1439.302106][T15816] _copy_from_user+0x1c/0xb0 [ 1439.302134][T15816] __copy_msghdr+0x244/0x300 [ 1439.302218][T15816] ___sys_sendmsg+0x10c/0x1e0 [ 1439.302322][T15816] __x64_sys_sendmsg+0xd4/0x160 [ 1439.302354][T15816] x64_sys_call+0x194c/0x3020 [ 1439.302447][T15816] do_syscall_64+0x12c/0x370 [ 1439.302469][T15816] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1439.302538][T15816] RIP: 0033:0x7f70b8f3c799 [ 1439.302555][T15816] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1439.302626][T15816] RSP: 002b:00007f70b798f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1439.302643][T15816] RAX: ffffffffffffffda RBX: 00007f70b91b5fa0 RCX: 00007f70b8f3c799 [ 1439.302655][T15816] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 1439.302731][T15816] RBP: 00007f70b798f090 R08: 0000000000000000 R09: 0000000000000000 [ 1439.302742][T15816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1439.302753][T15816] R13: 00007f70b91b6038 R14: 00007f70b91b5fa0 R15: 00007fffc32830b8 [ 1439.302771][T15816] [ 1439.516997][T15825] loop8: detected capacity change from 0 to 512 [ 1439.559945][T15828] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15828 comm=syz.7.10914 [ 1439.575609][T15831] FAULT_INJECTION: forcing a failure. [ 1439.575609][T15831] name failslab, interval 1, probability 0, space 0, times 0 [ 1439.589104][T15831] CPU: 1 UID: 0 PID: 15831 Comm: syz.0.10915 Tainted: G W syzkaller #0 PREEMPT(full) [ 1439.589154][T15831] Tainted: [W]=WARN [ 1439.589161][T15831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1439.589173][T15831] Call Trace: [ 1439.589180][T15831] [ 1439.589188][T15831] __dump_stack+0x1d/0x30 [ 1439.589247][T15831] dump_stack_lvl+0x95/0xd0 [ 1439.589271][T15831] dump_stack+0x15/0x1b [ 1439.589369][T15831] should_fail_ex+0x263/0x280 [ 1439.589388][T15831] should_failslab+0x8c/0xb0 [ 1439.589406][T15831] kmem_cache_alloc_noprof+0x66/0x400 [ 1439.589519][T15831] ? audit_log_start+0x34c/0x730 [ 1439.589552][T15831] audit_log_start+0x34c/0x730 [ 1439.589573][T15831] ? kstrtouint_from_user+0xa8/0xf0 [ 1439.589654][T15831] audit_seccomp+0x47/0x100 [ 1439.589683][T15831] ? __seccomp_filter+0x8db/0x1350 [ 1439.589710][T15831] __seccomp_filter+0x8ec/0x1350 [ 1439.589774][T15831] ? __rcu_read_unlock+0x4e/0x70 [ 1439.589795][T15831] ? __fget_files+0x184/0x1c0 [ 1439.589818][T15831] ? mutex_lock+0x57/0x90 [ 1439.589891][T15831] ? mutex_unlock+0x4e/0x90 [ 1439.589919][T15831] __secure_computing+0x81/0x150 [ 1439.589995][T15831] do_syscall_64+0xd3/0x370 [ 1439.590017][T15831] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1439.590039][T15831] RIP: 0033:0x7fa52729c799 [ 1439.590055][T15831] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1439.590136][T15831] RSP: 002b:00007fa525cf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1439.590217][T15831] RAX: ffffffffffffffda RBX: 00007fa527515fa0 RCX: 00007fa52729c799 [ 1439.590231][T15831] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000000 [ 1439.590245][T15831] RBP: 00007fa525cf7090 R08: 0000000000000000 R09: 0000000000000000 [ 1439.590270][T15831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1439.590283][T15831] R13: 00007fa527516038 R14: 00007fa527515fa0 R15: 00007fff81399b08 [ 1439.590303][T15831] [ 1439.593232][T15825] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1439.807283][T15825] ext4 filesystem being mounted at /88/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1439.862218][T15841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=15841 comm=syz.7.10917 [ 1439.901847][T14437] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1439.918930][T14437] ================================================================== [ 1439.927031][T14437] BUG: KCSAN: data-race in __lru_add_drain_all / folio_add_lru [ 1439.934579][T14437] [ 1439.936889][T14437] read-write to 0xffff888237c26668 of 1 bytes by task 15846 on cpu 0: [ 1439.945024][T14437] folio_add_lru+0xa4/0x1e0 [ 1439.949529][T14437] folio_add_lru_vma+0x49/0x70 [ 1439.954287][T14437] set_pte_range+0x235/0x4f0 [ 1439.958879][T14437] finish_fault+0x937/0xaf0 [ 1439.963375][T14437] handle_mm_fault+0x1dd5/0x3020 [ 1439.968308][T14437] do_user_addr_fault+0x3fd/0x1050 [ 1439.973424][T14437] exc_page_fault+0x62/0xa0 [ 1439.977933][T14437] asm_exc_page_fault+0x26/0x30 [ 1439.982778][T14437] rep_stos_alternative+0x40/0x80 [ 1439.987812][T14437] elf_load+0x3ba/0x500 [ 1439.991964][T14437] load_elf_binary+0xbe6/0x1a20 [ 1439.996811][T14437] bprm_execve+0x476/0x9c0 [ 1440.001229][T14437] kernel_execve+0x5ea/0x630 [ 1440.005831][T14437] call_usermodehelper_exec_async+0x196/0x250 [ 1440.011899][T14437] ret_from_fork+0x150/0x360 [ 1440.016491][T14437] ret_from_fork_asm+0x1a/0x30 [ 1440.021259][T14437] [ 1440.023571][T14437] read to 0xffff888237c26668 of 1 bytes by task 14437 on cpu 1: [ 1440.031187][T14437] __lru_add_drain_all+0x17e/0x450 [ 1440.036293][T14437] lru_add_drain_all+0x10/0x20 [ 1440.041051][T14437] invalidate_bdev+0x47/0x70 [ 1440.045627][T14437] ext4_put_super+0x624/0x7d0 [ 1440.050294][T14437] generic_shutdown_super+0xee/0x220 [ 1440.055581][T14437] kill_block_super+0x2a/0x70 [ 1440.060251][T14437] ext4_kill_sb+0x42/0x80 [ 1440.064565][T14437] deactivate_locked_super+0x75/0x1c0 [ 1440.069931][T14437] deactivate_super+0x97/0xa0 [ 1440.074602][T14437] cleanup_mnt+0x2bb/0x330 [ 1440.079011][T14437] __cleanup_mnt+0x19/0x20 [ 1440.083441][T14437] task_work_run+0x130/0x1a0 [ 1440.088045][T14437] exit_to_user_mode_loop+0x1f4/0x6f0 [ 1440.093401][T14437] do_syscall_64+0x249/0x370 [ 1440.098004][T14437] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1440.103889][T14437] [ 1440.106203][T14437] value changed: 0x03 -> 0x04 [ 1440.110858][T14437] [ 1440.113165][T14437] Reported by Kernel Concurrency Sanitizer on: [ 1440.119298][T14437] CPU: 1 UID: 0 PID: 14437 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(full) [ 1440.130397][T14437] Tainted: [W]=WARN [ 1440.134189][T14437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1440.144228][T14437] ==================================================================