Warning: Permanently added '10.128.1.140' (ED25519) to the list of known hosts. 2024/01/21 20:31:11 fuzzer started 2024/01/21 20:31:11 dialing manager at 10.128.0.163:30015 [ 26.184044][ T27] audit: type=1400 audit(1705869071.778:82): avc: denied { node_bind } for pid=3056 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.206671][ T27] audit: type=1400 audit(1705869071.808:83): avc: denied { name_bind } for pid=3056 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 26.301290][ T27] audit: type=1400 audit(1705869071.898:84): avc: denied { mounton } for pid=3063 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.306276][ T3063] cgroup: Unknown subsys name 'net' [ 26.324098][ T27] audit: type=1400 audit(1705869071.898:85): avc: denied { mount } for pid=3063 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.351505][ T27] audit: type=1400 audit(1705869071.928:86): avc: denied { unmount } for pid=3063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.486607][ T3063] cgroup: Unknown subsys name 'rlimit' [ 26.607091][ T27] audit: type=1400 audit(1705869072.208:87): avc: denied { mounton } for pid=3063 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.632047][ T27] audit: type=1400 audit(1705869072.208:88): avc: denied { mount } for pid=3063 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.639207][ T3064] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.657478][ T27] audit: type=1400 audit(1705869072.208:89): avc: denied { create } for pid=3063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.684470][ T27] audit: type=1400 audit(1705869072.208:90): avc: denied { write } for pid=3063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2024/01/21 20:31:12 syscalls: 2889 2024/01/21 20:31:12 code coverage: enabled 2024/01/21 20:31:12 comparison tracing: enabled 2024/01/21 20:31:12 extra coverage: enabled 2024/01/21 20:31:12 delay kcov mmap: enabled 2024/01/21 20:31:12 setuid sandbox: enabled 2024/01/21 20:31:12 namespace sandbox: enabled 2024/01/21 20:31:12 Android sandbox: enabled 2024/01/21 20:31:12 fault injection: enabled 2024/01/21 20:31:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/01/21 20:31:12 net packet injection: enabled 2024/01/21 20:31:12 net device setup: enabled 2024/01/21 20:31:12 concurrency sanitizer: enabled 2024/01/21 20:31:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/01/21 20:31:12 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/01/21 20:31:12 USB emulation: /dev/raw-gadget does not exist 2024/01/21 20:31:12 hci packet injection: /dev/vhci does not exist 2024/01/21 20:31:12 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/01/21 20:31:12 802.15.4 emulation: enabled 2024/01/21 20:31:12 swap file: enabled 2024/01/21 20:31:12 suppressing KCSAN reports in functions: 'ext4_da_write_end' 'generic_fillattr' 'dentry_unlink_inode' 2024/01/21 20:31:12 fetching corpus: 0, signal 0/2000 (executing program) [ 26.704870][ T27] audit: type=1400 audit(1705869072.208:91): avc: denied { read } for pid=3063 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.712247][ T3063] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/01/21 20:31:12 fetching corpus: 44, signal 15975/19493 (executing program) 2024/01/21 20:31:12 fetching corpus: 93, signal 29701/34343 (executing program) 2024/01/21 20:31:12 fetching corpus: 142, signal 35054/40902 (executing program) 2024/01/21 20:31:12 fetching corpus: 189, signal 39125/46086 (executing program) 2024/01/21 20:31:12 fetching corpus: 239, signal 43642/51561 (executing program) 2024/01/21 20:31:12 fetching corpus: 287, signal 47090/55954 (executing program) 2024/01/21 20:31:12 fetching corpus: 337, signal 51204/60775 (executing program) 2024/01/21 20:31:13 fetching corpus: 387, signal 54397/64689 (executing program) 2024/01/21 20:31:13 fetching corpus: 436, signal 57215/68197 (executing program) 2024/01/21 20:31:13 fetching corpus: 485, signal 60786/72270 (executing program) 2024/01/21 20:31:13 fetching corpus: 534, signal 63808/75796 (executing program) 2024/01/21 20:31:13 fetching corpus: 581, signal 66184/78680 (executing program) 2024/01/21 20:31:13 fetching corpus: 631, signal 67729/80846 (executing program) 2024/01/21 20:31:13 fetching corpus: 681, signal 70341/83792 (executing program) 2024/01/21 20:31:13 fetching corpus: 731, signal 72775/86496 (executing program) 2024/01/21 20:31:13 fetching corpus: 781, signal 74153/88403 (executing program) 2024/01/21 20:31:13 fetching corpus: 831, signal 76417/90888 (executing program) 2024/01/21 20:31:13 fetching corpus: 880, signal 78920/93470 (executing program) 2024/01/21 20:31:13 fetching corpus: 930, signal 79917/94924 (executing program) 2024/01/21 20:31:14 fetching corpus: 980, signal 81820/97021 (executing program) 2024/01/21 20:31:14 fetching corpus: 1030, signal 83276/98712 (executing program) 2024/01/21 20:31:14 fetching corpus: 1079, signal 84813/100421 (executing program) 2024/01/21 20:31:14 fetching corpus: 1128, signal 86586/102163 (executing program) 2024/01/21 20:31:14 fetching corpus: 1178, signal 87437/103317 (executing program) 2024/01/21 20:31:14 fetching corpus: 1228, signal 88607/104652 (executing program) 2024/01/21 20:31:14 fetching corpus: 1277, signal 89998/106053 (executing program) 2024/01/21 20:31:14 fetching corpus: 1327, signal 91185/107268 (executing program) 2024/01/21 20:31:14 fetching corpus: 1377, signal 93222/108973 (executing program) 2024/01/21 20:31:14 fetching corpus: 1427, signal 94354/110119 (executing program) 2024/01/21 20:31:14 fetching corpus: 1477, signal 95456/111223 (executing program) 2024/01/21 20:31:14 fetching corpus: 1527, signal 97542/112785 (executing program) 2024/01/21 20:31:14 fetching corpus: 1577, signal 98725/113870 (executing program) 2024/01/21 20:31:15 fetching corpus: 1627, signal 99608/114717 (executing program) 2024/01/21 20:31:15 fetching corpus: 1676, signal 100912/115768 (executing program) 2024/01/21 20:31:15 fetching corpus: 1726, signal 101911/116641 (executing program) 2024/01/21 20:31:15 fetching corpus: 1775, signal 103320/117697 (executing program) 2024/01/21 20:31:15 fetching corpus: 1825, signal 104170/118417 (executing program) 2024/01/21 20:31:15 fetching corpus: 1875, signal 105361/119225 (executing program) 2024/01/21 20:31:15 fetching corpus: 1925, signal 106250/119909 (executing program) 2024/01/21 20:31:15 fetching corpus: 1975, signal 107581/120734 (executing program) 2024/01/21 20:31:15 fetching corpus: 2023, signal 108596/121424 (executing program) 2024/01/21 20:31:15 fetching corpus: 2073, signal 109416/122036 (executing program) 2024/01/21 20:31:15 fetching corpus: 2123, signal 110515/122693 (executing program) 2024/01/21 20:31:15 fetching corpus: 2172, signal 111346/123273 (executing program) 2024/01/21 20:31:15 fetching corpus: 2221, signal 112203/123771 (executing program) 2024/01/21 20:31:16 fetching corpus: 2270, signal 112919/124287 (executing program) 2024/01/21 20:31:16 fetching corpus: 2319, signal 113619/124697 (executing program) 2024/01/21 20:31:16 fetching corpus: 2369, signal 114547/125160 (executing program) 2024/01/21 20:31:16 fetching corpus: 2418, signal 115238/125535 (executing program) 2024/01/21 20:31:16 fetching corpus: 2468, signal 116005/125927 (executing program) 2024/01/21 20:31:16 fetching corpus: 2517, signal 116724/126246 (executing program) 2024/01/21 20:31:16 fetching corpus: 2566, signal 117639/126618 (executing program) 2024/01/21 20:31:16 fetching corpus: 2615, signal 118586/126922 (executing program) 2024/01/21 20:31:16 fetching corpus: 2664, signal 119511/127222 (executing program) 2024/01/21 20:31:16 fetching corpus: 2713, signal 120033/127443 (executing program) 2024/01/21 20:31:16 fetching corpus: 2762, signal 120695/127677 (executing program) 2024/01/21 20:31:16 fetching corpus: 2811, signal 121600/127891 (executing program) 2024/01/21 20:31:17 fetching corpus: 2860, signal 122388/128062 (executing program) 2024/01/21 20:31:17 fetching corpus: 2910, signal 122898/128211 (executing program) 2024/01/21 20:31:17 fetching corpus: 2959, signal 123424/128302 (executing program) 2024/01/21 20:31:17 fetching corpus: 3008, signal 124059/128425 (executing program) 2024/01/21 20:31:17 fetching corpus: 3056, signal 124720/128513 (executing program) 2024/01/21 20:31:17 fetching corpus: 3106, signal 125624/128576 (executing program) 2024/01/21 20:31:17 fetching corpus: 3155, signal 126377/128591 (executing program) 2024/01/21 20:31:17 fetching corpus: 3175, signal 126653/128609 (executing program) 2024/01/21 20:31:17 fetching corpus: 3175, signal 126653/128609 (executing program) 2024/01/21 20:31:19 starting 6 fuzzer processes 20:31:19 executing program 0: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$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") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:31:19 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 20:31:19 executing program 1: ioperm(0x0, 0x7f, 0x2) syz_io_uring_setup(0x0, &(0x7f00000006c0), &(0x7f0000000740), &(0x7f0000000780)) 20:31:19 executing program 2: mq_notify(0xffffffffffffffff, 0x0) 20:31:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) 20:31:19 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$can_raw(0x1d, 0x3, 0x1) [ 33.853746][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 33.853761][ T27] audit: type=1400 audit(1705869079.448:96): avc: denied { execmem } for pid=3073 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 33.918409][ T27] audit: type=1400 audit(1705869079.488:97): avc: denied { append } for pid=2746 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.940617][ T27] audit: type=1400 audit(1705869079.488:98): avc: denied { open } for pid=2746 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.963168][ T27] audit: type=1400 audit(1705869079.488:99): avc: denied { getattr } for pid=2746 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.985791][ T27] audit: type=1400 audit(1705869079.518:100): avc: denied { read } for pid=3077 comm="syz-executor.2" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.007200][ T27] audit: type=1400 audit(1705869079.518:101): avc: denied { open } for pid=3077 comm="syz-executor.2" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.030704][ T27] audit: type=1400 audit(1705869079.518:102): avc: denied { mounton } for pid=3077 comm="syz-executor.2" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 34.052345][ T27] audit: type=1400 audit(1705869079.518:103): avc: denied { module_request } for pid=3077 comm="syz-executor.2" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 34.154985][ T27] audit: type=1400 audit(1705869079.628:104): avc: denied { sys_module } for pid=3080 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 34.428593][ T3080] chnl_net:caif_netlink_parms(): no params data found [ 34.439174][ T3077] chnl_net:caif_netlink_parms(): no params data found [ 34.462371][ T3081] chnl_net:caif_netlink_parms(): no params data found [ 34.548101][ T3077] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.555195][ T3077] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.562297][ T3077] bridge_slave_0: entered allmulticast mode [ 34.568845][ T3077] bridge_slave_0: entered promiscuous mode [ 34.575984][ T3077] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.583029][ T3077] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.590483][ T3077] bridge_slave_1: entered allmulticast mode [ 34.596898][ T3077] bridge_slave_1: entered promiscuous mode [ 34.619498][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.626789][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.633872][ T3081] bridge_slave_0: entered allmulticast mode [ 34.640462][ T3081] bridge_slave_0: entered promiscuous mode [ 34.648214][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.655302][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.662711][ T3081] bridge_slave_1: entered allmulticast mode [ 34.669053][ T3081] bridge_slave_1: entered promiscuous mode [ 34.696560][ T3080] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.703639][ T3080] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.710789][ T3080] bridge_slave_0: entered allmulticast mode [ 34.717258][ T3080] bridge_slave_0: entered promiscuous mode [ 34.729394][ T3080] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.736477][ T3080] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.743645][ T3080] bridge_slave_1: entered allmulticast mode [ 34.749987][ T3080] bridge_slave_1: entered promiscuous mode [ 34.766994][ T3081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.777397][ T3077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.804140][ T3081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.822685][ T3077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.846471][ T3080] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.860690][ T3081] team0: Port device team_slave_0 added [ 34.877234][ T3077] team0: Port device team_slave_0 added [ 34.885531][ T3080] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.895294][ T3081] team0: Port device team_slave_1 added [ 34.906725][ T3077] team0: Port device team_slave_1 added [ 34.912371][ T3083] chnl_net:caif_netlink_parms(): no params data found [ 34.923318][ T3108] chnl_net:caif_netlink_parms(): no params data found [ 34.953566][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.960531][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.986455][ T3081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.010477][ T3080] team0: Port device team_slave_0 added [ 35.017114][ T3080] team0: Port device team_slave_1 added [ 35.027944][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.034960][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.060959][ T3081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.076639][ T3077] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.083672][ T3077] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.109608][ T3077] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.140242][ T3080] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.147423][ T3080] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.173357][ T3080] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.186520][ T3077] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.193537][ T3077] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.219520][ T3077] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.246903][ T3080] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.253866][ T3080] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.279816][ T3080] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.306625][ T3089] chnl_net:caif_netlink_parms(): no params data found [ 35.323658][ T3083] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.330878][ T3083] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.338067][ T3083] bridge_slave_0: entered allmulticast mode [ 35.344547][ T3083] bridge_slave_0: entered promiscuous mode [ 35.351548][ T3083] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.358762][ T3083] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.365985][ T3083] bridge_slave_1: entered allmulticast mode [ 35.372299][ T3083] bridge_slave_1: entered promiscuous mode [ 35.380286][ T3081] hsr_slave_0: entered promiscuous mode [ 35.386574][ T3081] hsr_slave_1: entered promiscuous mode [ 35.434154][ T3108] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.441251][ T3108] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.448445][ T3108] bridge_slave_0: entered allmulticast mode [ 35.454845][ T3108] bridge_slave_0: entered promiscuous mode [ 35.468296][ T3080] hsr_slave_0: entered promiscuous mode [ 35.474344][ T3080] hsr_slave_1: entered promiscuous mode [ 35.481450][ T3080] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.489044][ T3080] Cannot create hsr debugfs directory [ 35.501057][ T3077] hsr_slave_0: entered promiscuous mode [ 35.506950][ T3077] hsr_slave_1: entered promiscuous mode [ 35.512683][ T3077] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.520563][ T3077] Cannot create hsr debugfs directory [ 35.527861][ T3083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.538096][ T3083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.562550][ T3108] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.569632][ T3108] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.576890][ T3108] bridge_slave_1: entered allmulticast mode [ 35.583351][ T3108] bridge_slave_1: entered promiscuous mode [ 35.613212][ T3108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.643721][ T3108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.656075][ T3083] team0: Port device team_slave_0 added [ 35.662477][ T3083] team0: Port device team_slave_1 added [ 35.711422][ T3089] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.718541][ T3089] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.725763][ T3089] bridge_slave_0: entered allmulticast mode [ 35.732205][ T3089] bridge_slave_0: entered promiscuous mode [ 35.743793][ T3108] team0: Port device team_slave_0 added [ 35.750417][ T3108] team0: Port device team_slave_1 added [ 35.757689][ T3083] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.764654][ T3083] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.790567][ T3083] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.802802][ T3083] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.809840][ T3083] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.835836][ T3083] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.846801][ T3089] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.853977][ T3089] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.862875][ T3089] bridge_slave_1: entered allmulticast mode [ 35.869252][ T3089] bridge_slave_1: entered promiscuous mode [ 35.917219][ T3108] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.924172][ T3108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.950362][ T3108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.962600][ T3108] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.969574][ T3108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.995581][ T3108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.015248][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.041615][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.064082][ T3083] hsr_slave_0: entered promiscuous mode [ 36.070199][ T3083] hsr_slave_1: entered promiscuous mode [ 36.076333][ T3083] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.083886][ T3083] Cannot create hsr debugfs directory [ 36.096527][ T3089] team0: Port device team_slave_0 added [ 36.116803][ T3089] team0: Port device team_slave_1 added [ 36.127666][ T27] audit: type=1400 audit(1705869081.728:105): avc: denied { create } for pid=3081 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.155976][ T3108] hsr_slave_0: entered promiscuous mode [ 36.161968][ T3108] hsr_slave_1: entered promiscuous mode [ 36.167913][ T3108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.175489][ T3108] Cannot create hsr debugfs directory [ 36.180917][ T3081] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.189502][ T3081] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.204814][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.211790][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.237773][ T3089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.249001][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.255975][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.282140][ T3089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.306721][ T3081] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.340818][ T3081] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.358427][ T3089] hsr_slave_0: entered promiscuous mode [ 36.364311][ T3089] hsr_slave_1: entered promiscuous mode [ 36.370490][ T3089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.378063][ T3089] Cannot create hsr debugfs directory [ 36.384623][ T3077] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 36.394737][ T3077] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 36.403435][ T3077] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 36.429538][ T3077] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 36.459993][ T3080] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.472679][ T3080] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.488075][ T3080] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.505410][ T3080] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.537459][ T3083] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.547182][ T3083] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.572374][ T3083] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 36.581265][ T3083] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 36.612674][ T3108] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 36.623416][ T3108] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 36.644121][ T3108] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 36.652694][ T3108] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.679451][ T3081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.696194][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.704564][ T3089] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 36.732706][ T3089] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 36.744033][ T3177] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.751125][ T3177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.761381][ T3177] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.768518][ T3177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.795813][ T3089] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 36.804508][ T3089] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 36.838895][ T3077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.874224][ T3108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.884564][ T3077] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.899792][ T3108] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.921687][ T3178] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.928796][ T3178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.937912][ T3178] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.944980][ T3178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.974220][ T3108] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 36.984719][ T3108] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.999013][ T3178] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.006131][ T3178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.026974][ T3083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.040926][ T3178] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.047998][ T3178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.066727][ T3077] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.077110][ T3077] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.109685][ T3083] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.125765][ T3081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.135996][ T3080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.153784][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.179823][ T3080] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.191759][ T3179] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.198851][ T3179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.226817][ T3077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.236680][ T3179] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.243763][ T3179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.253568][ T3179] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.260697][ T3179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.275566][ T3176] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.282661][ T3176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.296508][ T3108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.312106][ T3083] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.322701][ T3083] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.344264][ T3089] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.381336][ T3081] veth0_vlan: entered promiscuous mode [ 37.390254][ T3080] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.427125][ T3177] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.434236][ T3177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.450864][ T3081] veth1_vlan: entered promiscuous mode [ 37.469761][ T3177] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.477000][ T3177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.500512][ T3083] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.524576][ T3089] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.535086][ T3089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.585391][ T3108] veth0_vlan: entered promiscuous mode [ 37.595899][ T3077] veth0_vlan: entered promiscuous mode [ 37.628910][ T3081] veth0_macvtap: entered promiscuous mode [ 37.644843][ T3081] veth1_macvtap: entered promiscuous mode [ 37.658507][ T3077] veth1_vlan: entered promiscuous mode [ 37.666924][ T3080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.674636][ T3108] veth1_vlan: entered promiscuous mode [ 37.693130][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.710697][ T3108] veth0_macvtap: entered promiscuous mode [ 37.719803][ T3108] veth1_macvtap: entered promiscuous mode [ 37.733073][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.747061][ T3089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.759705][ T3077] veth0_macvtap: entered promiscuous mode [ 37.773151][ T3077] veth1_macvtap: entered promiscuous mode [ 37.788421][ T3081] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.797318][ T3081] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.806256][ T3081] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.815073][ T3081] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.830556][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.841091][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.852637][ T3108] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.865570][ T3083] veth0_vlan: entered promiscuous mode [ 37.875445][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.886038][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.897215][ T3108] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.907303][ T3108] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.916065][ T3108] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.924850][ T3108] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.933689][ T3108] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.954573][ T3077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.965105][ T3077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.975018][ T3077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.985570][ T3077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.997456][ T3077] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.009613][ T3077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.020209][ T3077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.030069][ T3077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.040506][ T3077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.051329][ T3077] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.075644][ T3077] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.084415][ T3077] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.093309][ T3077] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.102076][ T3077] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.131898][ T3083] veth1_vlan: entered promiscuous mode [ 38.143700][ T3250] loop3: detected capacity change from 0 to 2048 [ 38.153106][ T3250] ======================================================= [ 38.153106][ T3250] WARNING: The mand mount option has been deprecated and [ 38.153106][ T3250] and is ignored by this kernel. Remove the mand [ 38.153106][ T3250] option from the mount to silence this warning. [ 38.153106][ T3250] ======================================================= [ 38.206097][ T3080] veth0_vlan: entered promiscuous mode [ 38.211934][ T3250] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended 20:31:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 38.225936][ T3250] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.242563][ T3083] veth0_macvtap: entered promiscuous mode [ 38.253672][ T3250] syz-executor.3 (3250) used greatest stack depth: 11456 bytes left [ 38.267998][ T3108] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 20:31:23 executing program 1: ioperm(0x0, 0x7f, 0x2) syz_io_uring_setup(0x0, &(0x7f00000006c0), &(0x7f0000000740), &(0x7f0000000780)) [ 38.279755][ T3080] veth1_vlan: entered promiscuous mode [ 38.300954][ T3083] veth1_macvtap: entered promiscuous mode [ 38.333947][ T3080] veth0_macvtap: entered promiscuous mode [ 38.358566][ T3265] loop3: detected capacity change from 0 to 2048 [ 38.369602][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 20:31:23 executing program 1: ioperm(0x0, 0x7f, 0x2) syz_io_uring_setup(0x0, &(0x7f00000006c0), &(0x7f0000000740), &(0x7f0000000780)) 20:31:24 executing program 1: ioperm(0x0, 0x7f, 0x2) syz_io_uring_setup(0x0, &(0x7f00000006c0), &(0x7f0000000740), &(0x7f0000000780)) 20:31:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 38.380119][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.390061][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 38.400578][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.410485][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 38.420935][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.436649][ T3083] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.445182][ T3265] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended [ 38.456028][ T3265] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.469402][ T3080] veth1_macvtap: entered promiscuous mode [ 38.471544][ T3277] loop1: detected capacity change from 0 to 2048 [ 38.483202][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.493776][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.503645][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.514116][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.518841][ T3277] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended 20:31:24 executing program 2: mq_notify(0xffffffffffffffff, 0x0) 20:31:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) 20:31:24 executing program 2: mq_notify(0xffffffffffffffff, 0x0) 20:31:24 executing program 2: mq_notify(0xffffffffffffffff, 0x0) [ 38.524026][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.540166][ T3277] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.543142][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.565746][ T3108] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 20:31:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 38.594323][ T3083] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.615943][ T3083] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.624730][ T3083] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.633561][ T3083] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 20:31:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 38.642350][ T3083] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.651877][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.704786][ T3089] veth0_vlan: entered promiscuous mode [ 38.728340][ T3293] loop1: detected capacity change from 0 to 2048 [ 38.731004][ T3289] loop2: detected capacity change from 0 to 2048 [ 38.743867][ T3292] loop3: detected capacity change from 0 to 2048 [ 38.756587][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 38.767084][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.777137][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 38.787590][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.790331][ T3292] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended [ 38.797570][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 38.808825][ T3292] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.817023][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.835987][ T3289] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 38.838708][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 38.849298][ T3289] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.857844][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.877381][ T3293] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 38.894005][ T3080] batman_adv: batadv0: Interface activated: batadv_slave_0 20:31:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) 20:31:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) 20:31:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 38.896533][ T3293] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.925533][ T3089] veth1_vlan: entered promiscuous mode [ 38.932268][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.947097][ T3108] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.953681][ T3077] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.956881][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.975689][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.985595][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 38.996205][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.006227][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.016187][ T3303] loop1: detected capacity change from 0 to 2048 [ 39.016812][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.033188][ T3080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.043730][ T3080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.069756][ T3303] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 39.071853][ T3306] loop2: detected capacity change from 0 to 2048 [ 39.091993][ T3303] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.105503][ T3080] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.117791][ T3309] loop3: detected capacity change from 0 to 2048 [ 39.147372][ T3080] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.156411][ T3080] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.165418][ T3080] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.165452][ T3306] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 39.174119][ T3080] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 20:31:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 39.184280][ T3306] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.217484][ T3089] veth0_macvtap: entered promiscuous mode [ 39.224139][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.246599][ T3089] veth1_macvtap: entered promiscuous mode [ 39.246847][ T3309] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended [ 39.267920][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.268616][ T3309] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 20:31:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) 20:31:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xff9, &(0x7f0000002300)=""/4089, 0x0, 0x10}, 0x90) [ 39.278644][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.300472][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.310994][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.320816][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.331257][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.341154][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.348582][ T27] kauditd_printk_skb: 21 callbacks suppressed [ 39.348594][ T27] audit: type=1400 audit(1705869084.948:127): avc: denied { create } for pid=3316 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=can_socket permissive=1 [ 39.351570][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.387750][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 20:31:25 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$can_raw(0x1d, 0x3, 0x1) [ 39.398176][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.410107][ T3108] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.412648][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.437514][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.448040][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.458307][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.468991][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.470817][ T3320] loop1: detected capacity change from 0 to 2048 [ 39.478944][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.495685][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.496836][ T3077] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.505554][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.505576][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.505587][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.532699][ T3320] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 39.534774][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.538164][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.547721][ T3320] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.581920][ T3325] loop2: detected capacity change from 0 to 2048 [ 39.636216][ T3089] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.645031][ T3089] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.647046][ T27] audit: type=1400 audit(1705869085.238:128): avc: denied { prog_load } for pid=3327 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.653831][ T3089] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 20:31:25 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$can_raw(0x1d, 0x3, 0x1) 20:31:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xff9, &(0x7f0000002300)=""/4089, 0x0, 0x10}, 0x90) 20:31:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) [ 39.673180][ T27] audit: type=1400 audit(1705869085.238:129): avc: denied { bpf } for pid=3327 comm="syz-executor.3" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.673208][ T27] audit: type=1400 audit(1705869085.248:130): avc: denied { perfmon } for pid=3327 comm="syz-executor.3" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.682109][ T3089] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 20:31:25 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$can_raw(0x1d, 0x3, 0x1) 20:31:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xff9, &(0x7f0000002300)=""/4089, 0x0, 0x10}, 0x90) [ 39.752122][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 20:31:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xff9, &(0x7f0000002300)=""/4089, 0x0, 0x10}, 0x90) 20:31:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x2}]}]}]}]}, 0x40}}, 0x0) [ 39.793527][ T3325] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 39.818623][ T3340] loop0: detected capacity change from 0 to 512 [ 39.826118][ T3340] EXT4-fs: test_dummy_encryption option not supported 20:31:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) [ 39.852029][ T3325] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.870103][ T3294] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 20:31:25 executing program 0: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$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") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 39.905297][ T27] audit: type=1400 audit(1705869085.508:131): avc: denied { create } for pid=3346 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 39.943515][ T27] audit: type=1400 audit(1705869085.508:132): avc: denied { create } for pid=3347 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 39.964018][ T27] audit: type=1400 audit(1705869085.508:133): avc: denied { write } for pid=3347 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 39.980222][ T3352] loop1: detected capacity change from 0 to 2048 20:31:25 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 20:31:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x2}]}]}]}]}, 0x40}}, 0x0) 20:31:25 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 20:31:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x2}]}]}]}]}, 0x40}}, 0x0) [ 39.984399][ T27] audit: type=1400 audit(1705869085.528:134): avc: denied { setopt } for pid=3346 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 40.010674][ T27] audit: type=1400 audit(1705869085.528:135): avc: denied { ioctl } for pid=3344 comm="syz-executor.4" path="socket:[4256]" dev="sockfs" ino=4256 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.036592][ T27] audit: type=1400 audit(1705869085.528:136): avc: denied { write } for pid=3346 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 20:31:25 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$eJzs3M1rHGUYAPBnZjfph62JWj9aq61WMYgmNv2wBw8qCh4UBD3U45qkpTb9oMnBlh5akXqUgicv4lHwL/CkF0FPgle9S6GUghgFYWVmZzfTTTYfTXZjs78fTPLOvu/MvM/MvLPvfG0AfWt/9ieJ2BERv0XEUGO0ZXfSKJSVm7t9eeLv25cnkqjX37uV5OX+un15olm2Od19xchIGpF+mkScX7jcmYuXTtemp6cuFONjs2fOj81cvPTiqTO1k1Mnp86OHzt2+FBUj44fKUqka4pzR/F/7+63Prj+zsTx6x/+9G05znIcS5mvRbJs2f2Ntdsun/DZqK5kcfeMnaV0slRopbxt3awQK5IWw0De/oeiUtpAQ/HmJxtaOaCr6oUO2Vfq9fpglr+1VBbYLJL2dl1pOzQAm1Tziz47/20Ovel5/D/cfK1xTprFPVcMjZxq61x/oO38dj09FhHHr/zzVTbEKq5DAADcre+z/s8Li/X/0nikVO7+4t7QcEQ8EBEPRsRDEbErIh6OyMs+WvRnVqP9DsnC/k96o5Re5dyXl/X/XinubWXD1lL8heFKMbYzj38gOXFqeuqlYp2MxMCWbHypexk/vPHr553y9pf6f9mQ1aHZFyzqcaO65c5pJmuztbXEXHbzasSe6nz88/3fpHUnIImI3RGxZ/nZDS/24annv9nbaYLl4++u+tcRz8Xi8TclHe9PHnz56PiRsXx/GGvuFQv9/Mu1dzstP4v/amkd9Dr+bPtvz1Md4x9OyvdrZ1a/jGu/f9bxnGa57Z/t+q39v/m/NlsbTN7/s3xO9nFtdvbCwYjB5O18fLD8+XhbufH58ln8IwcW2/6NY1xzTTweEdlO/EREPFkcC7O6PxURT0fEgba4/j3RSlYGXn/mozsyq4vHvy+L/1bvt//k0vt/2/ZffaJy+sfvOi1/Zce/w3lqpPhkmeNffk1jpRVc6/oDAACAe0GaPxufpKOtdJqOjjae4d8V29PpczOz9UrE2cnGM/TDMZA2r3QNla6HHmxdnGmMjxcXA5v5h4rrxl9UtuXjoxPnpic3OHbod0c7tP+IufoflY2uHdB1K3oVbV/36wH03uZ6FRVYDe0f+ld7+1/5Y5avduu9GKBHfP9D/9L+oX9p/9C/7rb9X1nnegC95/sf+pf2D32pw7vxW9b4yv9mSWyLiF4uNGLdZpjmv1u4jjPso0Q1T1S+XPc5N3+WZGFWZZGpNrQNbuhhCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYN38FwAA//98Z88t") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:31:25 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 20:31:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x2}]}]}]}]}, 0x40}}, 0x0) [ 40.067336][ T3360] loop0: detected capacity change from 0 to 512 [ 40.079053][ T3360] EXT4-fs: test_dummy_encryption option not supported [ 40.087400][ T3077] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.102791][ T3352] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended 20:31:25 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) [ 40.114323][ T3358] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 40.127613][ T3352] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 20:31:25 executing program 0: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$eJzs3M1rHGUYAPBnZjfph62JWj9aq61WMYgmNv2wBw8qCh4UBD3U45qkpTb9oMnBlh5akXqUgicv4lHwL/CkF0FPgle9S6GUghgFYWVmZzfTTTYfTXZjs78fTPLOvu/MvM/MvLPvfG0AfWt/9ieJ2BERv0XEUGO0ZXfSKJSVm7t9eeLv25cnkqjX37uV5OX+un15olm2Od19xchIGpF+mkScX7jcmYuXTtemp6cuFONjs2fOj81cvPTiqTO1k1Mnp86OHzt2+FBUj44fKUqka4pzR/F/7+63Prj+zsTx6x/+9G05znIcS5mvRbJs2f2Ntdsun/DZqK5kcfeMnaV0slRopbxt3awQK5IWw0De/oeiUtpAQ/HmJxtaOaCr6oUO2Vfq9fpglr+1VBbYLJL2dl1pOzQAm1Tziz47/20Ovel5/D/cfK1xTprFPVcMjZxq61x/oO38dj09FhHHr/zzVTbEKq5DAADcre+z/s8Li/X/0nikVO7+4t7QcEQ8EBEPRsRDEbErIh6OyMs+WvRnVqP9DsnC/k96o5Re5dyXl/X/XinubWXD1lL8heFKMbYzj38gOXFqeuqlYp2MxMCWbHypexk/vPHr553y9pf6f9mQ1aHZFyzqcaO65c5pJmuztbXEXHbzasSe6nz88/3fpHUnIImI3RGxZ/nZDS/24annv9nbaYLl4++u+tcRz8Xi8TclHe9PHnz56PiRsXx/GGvuFQv9/Mu1dzstP4v/amkd9Dr+bPtvz1Md4x9OyvdrZ1a/jGu/f9bxnGa57Z/t+q39v/m/NlsbTN7/s3xO9nFtdvbCwYjB5O18fLD8+XhbufH58ln8IwcW2/6NY1xzTTweEdlO/EREPFkcC7O6PxURT0fEgba4/j3RSlYGXn/mozsyq4vHvy+L/1bvt//k0vt/2/ZffaJy+sfvOi1/Zce/w3lqpPhkmeNffk1jpRVc6/oDAACAe0GaPxufpKOtdJqOjjae4d8V29PpczOz9UrE2cnGM/TDMZA2r3QNla6HHmxdnGmMjxcXA5v5h4rrxl9UtuXjoxPnpic3OHbod0c7tP+IufoflY2uHdB1K3oVbV/36wH03uZ6FRVYDe0f+ld7+1/5Y5avduu9GKBHfP9D/9L+oX9p/9C/7rb9X1nnegC95/sf+pf2D32pw7vxW9b4yv9mSWyLiF4uNGLdZpjmv1u4jjPso0Q1T1S+XPc5N3+WZGFWZZGpNrQNbuhhCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYN38FwAA//98Z88t") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:31:25 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x20) 20:31:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, 0x0, &(0x7f00000000c0)) 20:31:25 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) 20:31:25 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x20) 20:31:25 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x20) [ 40.202762][ T3374] loop2: detected capacity change from 0 to 512 [ 40.212037][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.218546][ T3377] loop0: detected capacity change from 0 to 512 [ 40.230811][ T3374] EXT4-fs: test_dummy_encryption option not supported [ 40.240764][ T3377] EXT4-fs: test_dummy_encryption option not supported 20:31:25 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x20) 20:31:25 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) 20:31:25 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$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") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:31:25 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) 20:31:25 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) [ 40.339327][ T3388] loop1: detected capacity change from 0 to 2048 20:31:26 executing program 0: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$eJzs3M1rHGUYAPBnZjfph62JWj9aq61WMYgmNv2wBw8qCh4UBD3U45qkpTb9oMnBlh5akXqUgicv4lHwL/CkF0FPgle9S6GUghgFYWVmZzfTTTYfTXZjs78fTPLOvu/MvM/MvLPvfG0AfWt/9ieJ2BERv0XEUGO0ZXfSKJSVm7t9eeLv25cnkqjX37uV5OX+un15olm2Od19xchIGpF+mkScX7jcmYuXTtemp6cuFONjs2fOj81cvPTiqTO1k1Mnp86OHzt2+FBUj44fKUqka4pzR/F/7+63Prj+zsTx6x/+9G05znIcS5mvRbJs2f2Ntdsun/DZqK5kcfeMnaV0slRopbxt3awQK5IWw0De/oeiUtpAQ/HmJxtaOaCr6oUO2Vfq9fpglr+1VBbYLJL2dl1pOzQAm1Tziz47/20Ovel5/D/cfK1xTprFPVcMjZxq61x/oO38dj09FhHHr/zzVTbEKq5DAADcre+z/s8Li/X/0nikVO7+4t7QcEQ8EBEPRsRDEbErIh6OyMs+WvRnVqP9DsnC/k96o5Re5dyXl/X/XinubWXD1lL8heFKMbYzj38gOXFqeuqlYp2MxMCWbHypexk/vPHr553y9pf6f9mQ1aHZFyzqcaO65c5pJmuztbXEXHbzasSe6nz88/3fpHUnIImI3RGxZ/nZDS/24annv9nbaYLl4++u+tcRz8Xi8TclHe9PHnz56PiRsXx/GGvuFQv9/Mu1dzstP4v/amkd9Dr+bPtvz1Md4x9OyvdrZ1a/jGu/f9bxnGa57Z/t+q39v/m/NlsbTN7/s3xO9nFtdvbCwYjB5O18fLD8+XhbufH58ln8IwcW2/6NY1xzTTweEdlO/EREPFkcC7O6PxURT0fEgba4/j3RSlYGXn/mozsyq4vHvy+L/1bvt//k0vt/2/ZffaJy+sfvOi1/Zce/w3lqpPhkmeNffk1jpRVc6/oDAACAe0GaPxufpKOtdJqOjjae4d8V29PpczOz9UrE2cnGM/TDMZA2r3QNla6HHmxdnGmMjxcXA5v5h4rrxl9UtuXjoxPnpic3OHbod0c7tP+IufoflY2uHdB1K3oVbV/36wH03uZ6FRVYDe0f+ld7+1/5Y5avduu9GKBHfP9D/9L+oX9p/9C/7rb9X1nnegC95/sf+pf2D32pw7vxW9b4yv9mSWyLiF4uNGLdZpjmv1u4jjPso0Q1T1S+XPc5N3+WZGFWZZGpNrQNbuhhCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYN38FwAA//98Z88t") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:31:26 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) [ 40.393906][ T3395] loop2: detected capacity change from 0 to 512 [ 40.402782][ T3388] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 40.414460][ T3395] EXT4-fs: test_dummy_encryption option not supported 20:31:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) 20:31:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) 20:31:26 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x62, 0xa}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x8, 0xee, &(0x7f0000000340)=""/238}, 0x21) 20:31:26 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) 20:31:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) [ 40.436043][ T3388] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.454186][ T3402] loop0: detected capacity change from 0 to 512 [ 40.462833][ T3358] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 40.480646][ T3402] EXT4-fs: test_dummy_encryption option not supported 20:31:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) 20:31:26 executing program 2: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2200519, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, 0xee00}}, {@noinit_itable}, {@discard}, {@test_dummy_encryption}, {@abort}, {@noblock_validity}, {@nodiscard}, {@bh}, {@resgid={'resgid', 0x3d, 0xee01}}, {@nojournal_checksum}, {@dioread_nolock}, {@usrjquota}, {@nolazytime}, {@lazytime}]}, 0x1, 0x48f, &(0x7f0000001a00)="$eJzs3M1rHGUYAPBnZjfph62JWj9aq61WMYgmNv2wBw8qCh4UBD3U45qkpTb9oMnBlh5akXqUgicv4lHwL/CkF0FPgle9S6GUghgFYWVmZzfTTTYfTXZjs78fTPLOvu/MvM/MvLPvfG0AfWt/9ieJ2BERv0XEUGO0ZXfSKJSVm7t9eeLv25cnkqjX37uV5OX+un15olm2Od19xchIGpF+mkScX7jcmYuXTtemp6cuFONjs2fOj81cvPTiqTO1k1Mnp86OHzt2+FBUj44fKUqka4pzR/F/7+63Prj+zsTx6x/+9G05znIcS5mvRbJs2f2Ntdsun/DZqK5kcfeMnaV0slRopbxt3awQK5IWw0De/oeiUtpAQ/HmJxtaOaCr6oUO2Vfq9fpglr+1VBbYLJL2dl1pOzQAm1Tziz47/20Ovel5/D/cfK1xTprFPVcMjZxq61x/oO38dj09FhHHr/zzVTbEKq5DAADcre+z/s8Li/X/0nikVO7+4t7QcEQ8EBEPRsRDEbErIh6OyMs+WvRnVqP9DsnC/k96o5Re5dyXl/X/XinubWXD1lL8heFKMbYzj38gOXFqeuqlYp2MxMCWbHypexk/vPHr553y9pf6f9mQ1aHZFyzqcaO65c5pJmuztbXEXHbzasSe6nz88/3fpHUnIImI3RGxZ/nZDS/24annv9nbaYLl4++u+tcRz8Xi8TclHe9PHnz56PiRsXx/GGvuFQv9/Mu1dzstP4v/amkd9Dr+bPtvz1Md4x9OyvdrZ1a/jGu/f9bxnGa57Z/t+q39v/m/NlsbTN7/s3xO9nFtdvbCwYjB5O18fLD8+XhbufH58ln8IwcW2/6NY1xzTTweEdlO/EREPFkcC7O6PxURT0fEgba4/j3RSlYGXn/mozsyq4vHvy+L/1bvt//k0vt/2/ZffaJy+sfvOi1/Zce/w3lqpPhkmeNffk1jpRVc6/oDAACAe0GaPxufpKOtdJqOjjae4d8V29PpczOz9UrE2cnGM/TDMZA2r3QNla6HHmxdnGmMjxcXA5v5h4rrxl9UtuXjoxPnpic3OHbod0c7tP+IufoflY2uHdB1K3oVbV/36wH03uZ6FRVYDe0f+ld7+1/5Y5avduu9GKBHfP9D/9L+oX9p/9C/7rb9X1nnegC95/sf+pf2D32pw7vxW9b4yv9mSWyLiF4uNGLdZpjmv1u4jjPso0Q1T1S+XPc5N3+WZGFWZZGpNrQNbuhhCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYN38FwAA//98Z88t") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xa4, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xe}}, @IFLA_VLAN_INGRESS_QOS={0x7c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6bd, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x15}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xe97e}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x14c000, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xff, 0x87d2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x42, 0xbb}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x4454}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xe4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:31:26 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) ftruncate(r0, 0x0) [ 40.551612][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 20:31:26 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) ftruncate(r0, 0x0) [ 40.593531][ T3416] loop2: detected capacity change from 0 to 512 [ 40.635378][ T3416] EXT4-fs: test_dummy_encryption option not supported [ 40.685349][ T3358] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 20:31:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:26 executing program 4: io_setup(0x40000000008, &(0x7f0000000240)=0x0) r1 = socket(0x1e, 0x801, 0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, r1, &(0x7f0000000140)="dc", 0x1}]) 20:31:26 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:26 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) ftruncate(r0, 0x0) 20:31:26 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) 20:31:26 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 40.736659][ T3348] syz-executor.3 (3348) used greatest stack depth: 11080 bytes left 20:31:26 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/3, 0xfdef) 20:31:26 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:26 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) ftruncate(r0, 0x0) 20:31:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:26 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:26 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:26 executing program 4: io_setup(0x40000000008, &(0x7f0000000240)=0x0) r1 = socket(0x1e, 0x801, 0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, r1, &(0x7f0000000140)="dc", 0x1}]) 20:31:26 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:26 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001940)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4c, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0x8000}, @TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0x3}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0xfffffffe}, @TCA_FQ_CE_THRESHOLD={0x8, 0xc, 0x101}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0x7}, @TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x11}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0x81}, @TCA_FQ_BUCKETS_LOG={0x8}]}}]}, 0x78}}, 0x0) 20:31:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0803}]}) poll(0x0, 0x0, 0x0) 20:31:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0803}]}) poll(0x0, 0x0, 0x0) 20:31:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4c, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0x8000}, @TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0x3}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0xfffffffe}, @TCA_FQ_CE_THRESHOLD={0x8, 0xc, 0x101}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0x7}, @TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x11}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0x81}, @TCA_FQ_BUCKETS_LOG={0x8}]}}]}, 0x78}}, 0x0) 20:31:26 executing program 4: io_setup(0x40000000008, &(0x7f0000000240)=0x0) r1 = socket(0x1e, 0x801, 0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, r1, &(0x7f0000000140)="dc", 0x1}]) 20:31:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0803}]}) poll(0x0, 0x0, 0x0) 20:31:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4c, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0x8000}, @TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0x3}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0xfffffffe}, @TCA_FQ_CE_THRESHOLD={0x8, 0xc, 0x101}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0x7}, @TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x11}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0x81}, @TCA_FQ_BUCKETS_LOG={0x8}]}}]}, 0x78}}, 0x0) 20:31:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0803}]}) poll(0x0, 0x0, 0x0) 20:31:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) 20:31:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4c, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0x8000}, @TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0x3}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0xfffffffe}, @TCA_FQ_CE_THRESHOLD={0x8, 0xc, 0x101}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0x7}, @TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x11}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0x81}, @TCA_FQ_BUCKETS_LOG={0x8}]}}]}, 0x78}}, 0x0) 20:31:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) 20:31:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) [ 41.012733][ T3478] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 41.022913][ T3478] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 41.050821][ T3482] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:31:26 executing program 4: io_setup(0x40000000008, &(0x7f0000000240)=0x0) r1 = socket(0x1e, 0x801, 0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, r1, &(0x7f0000000140)="dc", 0x1}]) 20:31:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) 20:31:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) [ 41.063183][ T3482] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 41.072609][ T3484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 41.088365][ T3484] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:31:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) [ 41.110498][ T3488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 41.121685][ T3488] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 41.131492][ T3490] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 41.141586][ T3490] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:31:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) 20:31:27 executing program 4: r0 = syz_io_uring_setup(0xd79, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}) io_uring_enter(r0, 0x291c, 0x0, 0x0, 0x0, 0x0) 20:31:27 executing program 2: init_module(0x0, 0x0, 0x0) 20:31:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:27 executing program 2: init_module(0x0, 0x0, 0x0) 20:31:27 executing program 4: r0 = syz_io_uring_setup(0xd79, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}) io_uring_enter(r0, 0x291c, 0x0, 0x0, 0x0, 0x0) 20:31:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 2: init_module(0x0, 0x0, 0x0) 20:31:27 executing program 4: r0 = syz_io_uring_setup(0xd79, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}) io_uring_enter(r0, 0x291c, 0x0, 0x0, 0x0, 0x0) 20:31:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 2: init_module(0x0, 0x0, 0x0) 20:31:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:27 executing program 4: r0 = syz_io_uring_setup(0xd79, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}) io_uring_enter(r0, 0x291c, 0x0, 0x0, 0x0, 0x0) 20:31:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) [ 41.712486][ T3448] syz-executor.1 (3448) used greatest stack depth: 11032 bytes left 20:31:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000004c0)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@private0, @in=@local}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) 20:31:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/kcm\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0xa000200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000540)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:31:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000004c0)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@private0, @in=@local}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) 20:31:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x33}, 0x0, @in6=@private0}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in6=@private2, 0x0, 0x1}]}]}, 0x13c}}, 0x0) 20:31:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000004c0)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@private0, @in=@local}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) 20:31:27 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0x18, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) 20:31:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x33}, 0x0, @in6=@private0}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in6=@private2, 0x0, 0x1}]}]}, 0x13c}}, 0x0) 20:31:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000004c0)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@private0, @in=@local}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) 20:31:27 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0x18, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) 20:31:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x33}, 0x0, @in6=@private0}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in6=@private2, 0x0, 0x1}]}]}, 0x13c}}, 0x0) 20:31:27 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xd) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) [ 41.922918][ T3552] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 20:31:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x33}, 0x0, @in6=@private0}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in6=@private2, 0x0, 0x1}]}]}, 0x13c}}, 0x0) 20:31:27 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0x18, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) 20:31:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x6a}}, &(0x7f00000002c0)='syzkaller\x00'}, 0x90) 20:31:28 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xd) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 20:31:28 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0x18, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) 20:31:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:28 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xd) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 20:31:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x6a}}, &(0x7f00000002c0)='syzkaller\x00'}, 0x90) 20:31:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:28 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xd) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 20:31:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x6a}}, &(0x7f00000002c0)='syzkaller\x00'}, 0x90) 20:31:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3}, 0x8) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000180)="e4", 0x1}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) 20:31:28 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x6a}}, &(0x7f00000002c0)='syzkaller\x00'}, 0x90) 20:31:28 executing program 0: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 2: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 0: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 2: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 0: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 2: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x5}, {}], 0x2) semop(r0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 20:31:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x65}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 20:31:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x65}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 20:31:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878394}, 0x98) 20:31:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x65}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 20:31:28 executing program 2: r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 20:31:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878394}, 0x98) 20:31:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x65}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 20:31:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [], 0x0, 0x0, 0x0}, 0x1e8) 20:31:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878394}, 0x98) 20:31:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878394}, 0x98) 20:31:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [], 0x0, 0x0, 0x0}, 0x1e8) 20:31:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [], 0x0, 0x0, 0x0}, 0x1e8) 20:31:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [], 0x0, 0x0, 0x0}, 0x1e8) 20:31:28 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) 20:31:28 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000001080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0xc0c0583b, &(0x7f0000000140)="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") 20:31:28 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000001080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0xc0c0583b, &(0x7f0000000140)="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") 20:31:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000001080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0xc0c0583b, &(0x7f0000000140)="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") 20:31:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000001080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0xc0c0583b, &(0x7f0000000140)="a373a0f887b2a44f820d1511ed6f832c604d234145fe0bdefccceef6049dc65c8e16916c903506e13206705e86d7afc2db28f53ba2d1620336b91afd80d88de8978643644b8d7ffb811d342402959397e72e1b083e3ec794afbe766aa9a202d7c53d1780d5642f26527139faa6b046bdaeb2e3d05d29e71de00e52ec3aa003a5a6df20d5103cf6eaa66de9ebb912878c8add33ee4cb0b0319e02ead67f027b3a98c0178aba9f65d72041f98d282ca0394455a746dd1ca9c500489206779d6ac657d40d008f5e2566326b7649b56f7eec254e8c11dc34ee2ec786dee88b837a0caf6dc015322fc742b52a9a8bc702440c12d82082c375fadcf9e58899a2359b9f") 20:31:29 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x1, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000000)) 20:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 20:31:29 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x1, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000000)) 20:31:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x1, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000000)) 20:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 20:31:29 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x1, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000000)) 20:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 20:31:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 2: r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 43.731752][ T3147] kernel read not supported for file /vcs (pid: 3147 comm: kworker/0:3) 20:31:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 20:31:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x8000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 20:31:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x8000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 20:31:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd80, 0xc00d, 0x0, 0x0, 0x0, 0x0}, 0x50) 20:31:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x8000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 20:31:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) [ 43.993835][ T3653] syz-executor.0 (3653) used greatest stack depth: 11016 bytes left 20:31:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x8000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 20:31:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:29 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) [ 44.211090][ T3667] syz-executor.3 (3667) used greatest stack depth: 10792 bytes left 20:31:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:30 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) 20:31:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:31 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) 20:31:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x208e24b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{}, 0x100, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x7, 0x3a2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, 0x0, 0x0) pread64(r3, &(0x7f0000000540)=""/60, 0x3c, 0x0) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000040)=ANY=[@ANYBLOB="0280f40118050000050000009417000ad30561cb"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f0000001cc0)={{}, r6, 0x6, @unused=[0xfffffffffffffffa, 0x8000, 0x200, 0x3], @subvolid=0x8}) socket$inet_sctp(0x2, 0x0, 0x84) syz_io_uring_setup(0x704f, &(0x7f0000000bc0)={0x0, 0x1f03}, &(0x7f0000000c40), &(0x7f0000000c80)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 20:31:32 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) [ 47.391000][ T3785] ================================================================== [ 47.399231][ T3785] BUG: KCSAN: data-race in __refill_stock / drain_all_stock [ 47.406575][ T3785] [ 47.408912][ T3785] read-write to 0xffff888237c2a690 of 4 bytes by task 3108 on cpu 0: [ 47.417000][ T3785] __refill_stock+0x7f/0xb0 [ 47.421543][ T3785] obj_cgroup_uncharge_pages+0x134/0x200 [ 47.427215][ T3785] refill_obj_stock+0x15c/0x1d0 [ 47.432093][ T3785] obj_cgroup_uncharge+0xe/0x10 [ 47.436969][ T3785] __memcg_slab_free_hook+0xa9/0x120 [ 47.442289][ T3785] kfree+0x19a/0x260 [ 47.446228][ T3785] kvfree+0x35/0x40 [ 47.450050][ T3785] xt_free_table_info+0xed/0x110 [ 47.455000][ T3785] __do_replace+0x4bc/0x580 [ 47.459513][ T3785] do_ip6t_set_ctl+0x1503/0x17f0 [ 47.464471][ T3785] nf_setsockopt+0x18d/0x1b0 [ 47.469074][ T3785] ipv6_setsockopt+0x11c/0x130 [ 47.473839][ T3785] tcp_setsockopt+0x90/0xa0 [ 47.478360][ T3785] sock_common_setsockopt+0x61/0x70 [ 47.483567][ T3785] __sys_setsockopt+0x1d4/0x240 [ 47.488429][ T3785] __x64_sys_setsockopt+0x66/0x80 [ 47.493472][ T3785] do_syscall_64+0x59/0x120 [ 47.498002][ T3785] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 47.504004][ T3785] [ 47.506335][ T3785] read to 0xffff888237c2a690 of 4 bytes by task 3785 on cpu 1: [ 47.513881][ T3785] drain_all_stock+0xd3/0x2e0 [ 47.518661][ T3785] try_charge_memcg+0x6c2/0xd20 [ 47.523527][ T3785] obj_cgroup_charge_pages+0xbd/0x1c0 [ 47.528909][ T3785] __memcg_kmem_charge_page+0x9c/0x170 [ 47.534382][ T3785] __alloc_pages+0x1bb/0x340 [ 47.538988][ T3785] alloc_pages_mpol+0xb1/0x1d0 [ 47.543772][ T3785] alloc_pages+0xe0/0x100 [ 47.548119][ T3785] __vmalloc_node_range+0x6d2/0xea0 [ 47.553333][ T3785] kvmalloc_node+0x121/0x160 [ 47.557936][ T3785] xt_alloc_table_info+0x3d/0x80 [ 47.562878][ T3785] do_arpt_set_ctl+0x634/0x13b0 [ 47.567734][ T3785] nf_setsockopt+0x18d/0x1b0 [ 47.572325][ T3785] ip_setsockopt+0xe6/0x100 [ 47.576844][ T3785] tcp_setsockopt+0x90/0xa0 [ 47.581374][ T3785] sock_common_setsockopt+0x61/0x70 [ 47.586600][ T3785] __sys_setsockopt+0x1d4/0x240 [ 47.591469][ T3785] __x64_sys_setsockopt+0x66/0x80 [ 47.596512][ T3785] do_syscall_64+0x59/0x120 [ 47.601045][ T3785] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 47.606952][ T3785] [ 47.609275][ T3785] value changed: 0x0000003f -> 0x00000040 [ 47.614990][ T3785] [ 47.617311][ T3785] Reported by Kernel Concurrency Sanitizer on: [ 47.623470][ T3785] CPU: 1 PID: 3785 Comm: syz-executor.5 Not tainted 6.7.0-syzkaller-13004-g4fbbed787267 #0 [ 47.633453][ T3785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 47.643508][ T3785] ================================================================== 20:31:33 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) 20:31:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000033c0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000040)="1a", 0x1}], 0x1, &(0x7f0000000400)=[@sndrcv={0x30}, @init={0x18}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8}}], 0x80}], 0x1, 0x20044040) 20:31:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000033c0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000040)="1a", 0x1}], 0x1, &(0x7f0000000400)=[@sndrcv={0x30}, @init={0x18}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8}}], 0x80}], 0x1, 0x20044040) 20:31:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xf0, 0x0, &(0x7f00000000c0)) 20:31:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000033c0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000040)="1a", 0x1}], 0x1, &(0x7f0000000400)=[@sndrcv={0x30}, @init={0x18}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8}}], 0x80}], 0x1, 0x20044040) 20:31:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000033c0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000040)="1a", 0x1}], 0x1, &(0x7f0000000400)=[@sndrcv={0x30}, @init={0x18}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8}}], 0x80}], 0x1, 0x20044040) [ 48.648025][ T3826] loop1: detected capacity change from 0 to 2048 [ 48.696424][ T3826] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 48.739687][ T3826] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 48.813313][ T3081] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.