T(r0, 0xc0189374, &(0x7f0000000600)=ANY=[@ANYBLOB="0101001080cd00ae6ff92fb00b5267decfff34af603aae3751847fb235bb21ca7ca6e2d0a5894bec1c646f6746cca420d46109a3681bc73505d9390f2a434fdc0101008026773b984bde550297af621920ef0b", @ANYRES32, @ANYBLOB="00000800000000002e2f66696c65307d762bee245b6675c14d15dbf2469c962f2e2e2f46696c653000f0448efa34427bde3b88ffaa1d04b41e3ff77aaef05961f89e62596b1d2281869b1b631d96fef52011a7d41424a63d6ceb6a3f404d2fe7a30359b8a2c1a4c226bf19ac8fa1c84d86d230e0f00dd358c2c4fe99514ca8a214b9045f4a9ab807545d640f15c32ad42a0086a62786370c314fdd0d504f674c454d88c3b9082a37c36e58a55d0c27cadefefcf4133045a6bae95e5a7f3c4b"]) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') mount$bind(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x400, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x1c0000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0xb0000, 0x0) (async) open_tree(r0, &(0x7f0000000380)='./file0\x00', 0x1900) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000600)=ANY=[@ANYBLOB="0101001080cd00ae6ff92fb00b5267decfff34af603aae3751847fb235bb21ca7ca6e2d0a5894bec1c646f6746cca420d46109a3681bc73505d9390f2a434fdc0101008026773b984bde550297af621920ef0b", @ANYRES32, @ANYBLOB="00000800000000002e2f66696c65307d762bee245b6675c14d15dbf2469c962f2e2e2f46696c653000f0448efa34427bde3b88ffaa1d04b41e3ff77aaef05961f89e62596b1d2281869b1b631d96fef52011a7d41424a63d6ceb6a3f404d2fe7a30359b8a2c1a4c226bf19ac8fa1c84d86d230e0f00dd358c2c4fe99514ca8a214b9045f4a9ab807545d640f15c32ad42a0086a62786370c314fdd0d504f674c454d88c3b9082a37c36e58a55d0c27cadefefcf4133045a6bae95e5a7f3c4b"]) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) mount$bind(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x400, 0x0) (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r2, r1, 0x0, 0x100800001) (async) 14:27:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x0) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:19 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x30}}, 0x0) 14:27:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0xe00, 0x0, 0x0, 0x600000}) 14:27:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x1c0000, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x1c0000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0xb0000, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0xb0000, 0x0) open_tree(r0, &(0x7f0000000380)='./file0\x00', 0x1900) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000600)=ANY=[@ANYBLOB="0101001080cd00ae6ff92fb00b5267decfff34af603aae3751847fb235bb21ca7ca6e2d0a5894bec1c646f6746cca420d46109a3681bc73505d9390f2a434fdc0101008026773b984bde550297af621920ef0b", @ANYRES32, @ANYBLOB="00000800000000002e2f66696c65307d762bee245b6675c14d15dbf2469c962f2e2e2f46696c653000f0448efa34427bde3b88ffaa1d04b41e3ff77aaef05961f89e62596b1d2281869b1b631d96fef52011a7d41424a63d6ceb6a3f404d2fe7a30359b8a2c1a4c226bf19ac8fa1c84d86d230e0f00dd358c2c4fe99514ca8a214b9045f4a9ab807545d640f15c32ad42a0086a62786370c314fdd0d504f674c454d88c3b9082a37c36e58a55d0c27cadefefcf4133045a6bae95e5a7f3c4b"]) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000600)=ANY=[@ANYBLOB="0101001080cd00ae6ff92fb00b5267decfff34af603aae3751847fb235bb21ca7ca6e2d0a5894bec1c646f6746cca420d46109a3681bc73505d9390f2a434fdc0101008026773b984bde550297af621920ef0b", @ANYRES32, @ANYBLOB="00000800000000002e2f66696c65307d762bee245b6675c14d15dbf2469c962f2e2e2f46696c653000f0448efa34427bde3b88ffaa1d04b41e3ff77aaef05961f89e62596b1d2281869b1b631d96fef52011a7d41424a63d6ceb6a3f404d2fe7a30359b8a2c1a4c226bf19ac8fa1c84d86d230e0f00dd358c2c4fe99514ca8a214b9045f4a9ab807545d640f15c32ad42a0086a62786370c314fdd0d504f674c454d88c3b9082a37c36e58a55d0c27cadefefcf4133045a6bae95e5a7f3c4b"]) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') mount$bind(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x400, 0x0) (async) mount$bind(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x400, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 14:27:19 executing program 5: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x0, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0xe01, 0x0, 0x0, 0x600000}) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 14:27:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x80000) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x7, 0xffffffffffffffff}) setxattr$incfs_size(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), &(0x7f0000000400)=0x8, 0x8, 0x2) mkdirat(r1, &(0x7f0000000080)='./file0/../file0\x00', 0x18) sendfile(r1, r0, 0x0, 0x100800001) 14:27:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) r0 = socket(0x40000000002, 0x3, 0x9) setsockopt(r0, 0xff, 0x1, 0x0, 0x32) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000080)=0x6e) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r1 = socket(0x40000000002, 0x3, 0x9) setsockopt(r1, 0xff, 0x1, 0x0, 0x32) recvmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000900)=[{&(0x7f00000004c0)=""/229, 0xe5}, {&(0x7f0000000400)=""/19, 0x13}, {&(0x7f0000000600)=""/178, 0xb2}, {&(0x7f00000006c0)=""/222, 0xde}, {&(0x7f00000007c0)=""/106, 0x6a}, {&(0x7f0000000840)=""/130, 0x82}], 0x6, &(0x7f0000000980)=""/4096, 0x1000}, 0x20100) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r3 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r3, r2, 0x0, 0x100800001) [ 215.513867][T19670] ipvlan8: entered promiscuous mode 14:27:19 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 14:27:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0xf00, 0x0, 0x0, 0x600000}) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 14:27:19 executing program 5: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 215.582792][T19681] ipvlan8: entered promiscuous mode 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 14:27:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0xf01, 0x0, 0x0, 0x600000}) 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 14:27:19 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) [ 215.644656][T19691] ipvlan8: entered promiscuous mode 14:27:19 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 14:27:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x80000) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x7, 0xffffffffffffffff}) setxattr$incfs_size(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), &(0x7f0000000400)=0x8, 0x8, 0x2) mkdirat(r1, &(0x7f0000000080)='./file0/../file0\x00', 0x18) sendfile(r1, r0, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x80000) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) umount2(&(0x7f0000000040)='./file0\x00', 0x4) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x7, 0xffffffffffffffff}) (async) setxattr$incfs_size(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), &(0x7f0000000400)=0x8, 0x8, 0x2) (async) mkdirat(r1, &(0x7f0000000080)='./file0/../file0\x00', 0x18) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) 14:27:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x80000) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x7, 0xffffffffffffffff}) setxattr$incfs_size(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), &(0x7f0000000400)=0x8, 0x8, 0x2) mkdirat(r1, &(0x7f0000000080)='./file0/../file0\x00', 0x18) sendfile(r1, r0, 0x0, 0x100800001) 14:27:20 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 14:27:20 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 14:27:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1001, 0x0, 0x0, 0x600000}) 14:27:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (fail_nth: 1) 14:27:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x80000) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async, rerun: 32) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async, rerun: 32) umount2(&(0x7f0000000040)='./file0\x00', 0x4) (async, rerun: 64) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x7, 0xffffffffffffffff}) (async, rerun: 64) setxattr$incfs_size(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), &(0x7f0000000400)=0x8, 0x8, 0x2) (async, rerun: 64) mkdirat(r1, &(0x7f0000000080)='./file0/../file0\x00', 0x18) sendfile(r1, r0, 0x0, 0x100800001) 14:27:20 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 14:27:20 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 14:27:20 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 216.396965][T19726] FAULT_INJECTION: forcing a failure. [ 216.396965][T19726] name failslab, interval 1, probability 0, space 0, times 0 [ 216.409715][T19726] CPU: 1 PID: 19726 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 216.420138][T19726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 216.430212][T19726] Call Trace: [ 216.433493][T19726] [ 216.436435][T19726] dump_stack_lvl+0xda/0x130 [ 216.441049][T19726] dump_stack+0x15/0x20 [ 216.445224][T19726] should_fail_ex+0x21f/0x230 [ 216.449995][T19726] ? alloc_pipe_info+0xaf/0x360 [ 216.454904][T19726] __should_failslab+0x92/0xa0 [ 216.459739][T19726] should_failslab+0x9/0x20 [ 216.464320][T19726] __kmem_cache_alloc_node+0x4e/0x210 [ 216.469720][T19726] ? _parse_integer_limit+0x167/0x180 [ 216.475175][T19726] ? alloc_pipe_info+0xaf/0x360 [ 216.480107][T19726] kmalloc_trace+0x2a/0xa0 [ 216.484689][T19726] alloc_pipe_info+0xaf/0x360 [ 216.489406][T19726] splice_direct_to_actor+0x636/0x690 [ 216.494806][T19726] ? fsnotify_perm+0x5a/0x380 [ 216.499532][T19726] ? security_file_permission+0x4f/0x70 [ 216.505158][T19726] ? direct_file_splice_eof+0x70/0x70 [ 216.510559][T19726] ? security_file_permission+0x5a/0x70 [ 216.516125][T19726] do_splice_direct+0x10d/0x190 [ 216.521016][T19726] ? do_splice_direct+0x190/0x190 [ 216.526060][T19726] do_sendfile+0x3c4/0x980 [ 216.530639][T19726] __x64_sys_sendfile64+0x110/0x150 [ 216.536005][T19726] do_syscall_64+0x44/0x110 [ 216.540534][T19726] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 216.546448][T19726] RIP: 0033:0x7f1299f18ce9 [ 216.550868][T19726] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 216.570473][T19726] RSP: 002b:00007f129929b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 216.579036][T19726] RAX: ffffffffffffffda RBX: 00007f129a037f80 RCX: 00007f1299f18ce9 [ 216.587037][T19726] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 14:27:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) r0 = dup(0xffffffffffffffff) openat(r0, &(0x7f0000000580)='./file0\x00', 0x8000, 0x81) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @empty, 'bond_slave_1\x00'}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="360d3bc89086dae1310659d20aa48753417ac940dbdf", 0x16}, {&(0x7f0000000380)="20e35e331293fdfe6693acb0c980761fdf87fff207dc3a2f1e49ef8428a9be311e7e5b468e7c362a8200490ca182ea9f8690407880d33d11b4e67499f463d52d8ecd3331e896453c15", 0x49}, {&(0x7f00000004c0)="b91ceb7643899c44721231295296e432b133e49f8222735a8b00d0435ca90372214c83b08ba34e775521d2f873d899fdb1501d1efe3b842c592da26792d6bcbbc2c9eb198f3c587806418624f3e0f991f23b340ae3880ffefe2e87db53fe86cba9e2c821f516268f90c87794bb0dfcf621cf8d7044ee1202f18481a7bef6b3184b8322af0fcab0f5a32deb981b63f2463b621a9c9ce98b", 0x97}, {&(0x7f0000000600)="0bf8a635f73450902555deab5e8ea56c57d9a466e1259caea5bf2f034ee53aea2d0d2bd823c0182ba4d36e8fd886fc92324b7a5b9154ec3c59eb46d3b26566a82735266f78823f8e213d69019f976b4945dcc864172abe237df10bb22ac89712edcca35875dec98b4ffc6af6631f4c16574f9dd917b49d71b5a6d116bd1775fec85f51a16a01dff5d4749539f88c40395c5a51d0ffa707bf3c658eea0332aa9f5615bf854e", 0xa5}, {&(0x7f00000006c0)="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", 0x1000}], 0x5, &(0x7f00000016c0)=[@txtime={{0x18, 0x1, 0x3d, 0x3f7f}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x89ad}}], 0x60}, 0x1) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) mount$bind(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0), 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1100, 0x0, 0x0, 0x600000}) 14:27:20 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 14:27:20 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 1) 14:27:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1101, 0x0, 0x0, 0x600000}) 14:27:20 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 14:27:20 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (fail_nth: 2) [ 216.595106][T19726] RBP: 00007f129929b120 R08: 0000000000000000 R09: 0000000000000000 [ 216.603078][T19726] R10: 0000000100800001 R11: 0000000000000246 R12: 0000000000000001 [ 216.611217][T19726] R13: 000000000000000b R14: 00007f129a037f80 R15: 00007ffd405db338 [ 216.619664][T19726] 14:27:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async, rerun: 32) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async, rerun: 32) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) r0 = dup(0xffffffffffffffff) openat(r0, &(0x7f0000000580)='./file0\x00', 0x8000, 0x81) (async, rerun: 32) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async, rerun: 32) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) sendmsg$sock(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @empty, 'bond_slave_1\x00'}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="360d3bc89086dae1310659d20aa48753417ac940dbdf", 0x16}, {&(0x7f0000000380)="20e35e331293fdfe6693acb0c980761fdf87fff207dc3a2f1e49ef8428a9be311e7e5b468e7c362a8200490ca182ea9f8690407880d33d11b4e67499f463d52d8ecd3331e896453c15", 0x49}, {&(0x7f00000004c0)="b91ceb7643899c44721231295296e432b133e49f8222735a8b00d0435ca90372214c83b08ba34e775521d2f873d899fdb1501d1efe3b842c592da26792d6bcbbc2c9eb198f3c587806418624f3e0f991f23b340ae3880ffefe2e87db53fe86cba9e2c821f516268f90c87794bb0dfcf621cf8d7044ee1202f18481a7bef6b3184b8322af0fcab0f5a32deb981b63f2463b621a9c9ce98b", 0x97}, {&(0x7f0000000600)="0bf8a635f73450902555deab5e8ea56c57d9a466e1259caea5bf2f034ee53aea2d0d2bd823c0182ba4d36e8fd886fc92324b7a5b9154ec3c59eb46d3b26566a82735266f78823f8e213d69019f976b4945dcc864172abe237df10bb22ac89712edcca35875dec98b4ffc6af6631f4c16574f9dd917b49d71b5a6d116bd1775fec85f51a16a01dff5d4749539f88c40395c5a51d0ffa707bf3c658eea0332aa9f5615bf854e", 0xa5}, {&(0x7f00000006c0)="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", 0x1000}], 0x5, &(0x7f00000016c0)=[@txtime={{0x18, 0x1, 0x3d, 0x3f7f}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x89ad}}], 0x60}, 0x1) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async, rerun: 64) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async, rerun: 64) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) mount$bind(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0), 0x0, 0x0) (async, rerun: 32) sendfile(r2, r1, 0x0, 0x100800001) (rerun: 32) 14:27:20 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) r0 = dup(0xffffffffffffffff) openat(r0, &(0x7f0000000580)='./file0\x00', 0x8000, 0x81) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) sendmsg$sock(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @empty, 'bond_slave_1\x00'}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="360d3bc89086dae1310659d20aa48753417ac940dbdf", 0x16}, {&(0x7f0000000380)="20e35e331293fdfe6693acb0c980761fdf87fff207dc3a2f1e49ef8428a9be311e7e5b468e7c362a8200490ca182ea9f8690407880d33d11b4e67499f463d52d8ecd3331e896453c15", 0x49}, {&(0x7f00000004c0)="b91ceb7643899c44721231295296e432b133e49f8222735a8b00d0435ca90372214c83b08ba34e775521d2f873d899fdb1501d1efe3b842c592da26792d6bcbbc2c9eb198f3c587806418624f3e0f991f23b340ae3880ffefe2e87db53fe86cba9e2c821f516268f90c87794bb0dfcf621cf8d7044ee1202f18481a7bef6b3184b8322af0fcab0f5a32deb981b63f2463b621a9c9ce98b", 0x97}, {&(0x7f0000000600)="0bf8a635f73450902555deab5e8ea56c57d9a466e1259caea5bf2f034ee53aea2d0d2bd823c0182ba4d36e8fd886fc92324b7a5b9154ec3c59eb46d3b26566a82735266f78823f8e213d69019f976b4945dcc864172abe237df10bb22ac89712edcca35875dec98b4ffc6af6631f4c16574f9dd917b49d71b5a6d116bd1775fec85f51a16a01dff5d4749539f88c40395c5a51d0ffa707bf3c658eea0332aa9f5615bf854e", 0xa5}, {&(0x7f00000006c0)="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", 0x1000}], 0x5, &(0x7f00000016c0)=[@txtime={{0x18, 0x1, 0x3d, 0x3f7f}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x89ad}}], 0x60}, 0x1) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) mount$bind(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0), 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100800001) [ 216.668348][T19751] FAULT_INJECTION: forcing a failure. [ 216.668348][T19751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.681553][T19751] CPU: 1 PID: 19751 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 216.691980][T19751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 216.702227][T19751] Call Trace: [ 216.705512][T19751] [ 216.708481][T19751] dump_stack_lvl+0xda/0x130 [ 216.713100][T19751] dump_stack+0x15/0x20 14:27:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1200, 0x0, 0x0, 0x600000}) [ 216.717278][T19751] should_fail_ex+0x21f/0x230 [ 216.722038][T19751] should_fail+0xb/0x10 [ 216.726213][T19751] should_fail_usercopy+0x1a/0x20 [ 216.731293][T19751] _copy_from_user+0x1e/0xd0 [ 216.735926][T19751] copy_msghdr_from_user+0x54/0x2a0 [ 216.738356][T19752] FAULT_INJECTION: forcing a failure. [ 216.738356][T19752] name failslab, interval 1, probability 0, space 0, times 0 [ 216.741139][T19751] __sys_sendmsg+0x17d/0x270 [ 216.758374][T19751] __x64_sys_sendmsg+0x46/0x50 [ 216.763169][T19751] do_syscall_64+0x44/0x110 [ 216.767987][T19751] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 216.773956][T19751] RIP: 0033:0x7f4feb1a7ce9 [ 216.778480][T19751] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 216.798165][T19751] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.806721][T19751] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 216.814694][T19751] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 216.822711][T19751] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 216.830851][T19751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.838829][T19751] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 216.846819][T19751] [ 216.849828][T19752] CPU: 0 PID: 19752 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 216.860267][T19752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 216.870644][T19752] Call Trace: [ 216.873937][T19752] [ 216.876947][T19752] dump_stack_lvl+0xda/0x130 [ 216.881639][T19752] dump_stack+0x15/0x20 [ 216.885870][T19752] should_fail_ex+0x21f/0x230 [ 216.890580][T19752] ? alloc_pipe_info+0x1ca/0x360 [ 216.895624][T19752] __should_failslab+0x92/0xa0 [ 216.900435][T19752] should_failslab+0x9/0x20 [ 216.904968][T19752] __kmem_cache_alloc_node+0x4e/0x210 [ 216.910360][T19752] ? __kmem_cache_alloc_node+0x17f/0x210 [ 216.916012][T19752] ? alloc_pipe_info+0x1ca/0x360 [ 216.920972][T19752] __kmalloc+0x95/0x1a0 [ 216.925231][T19752] ? kmalloc_trace+0x2a/0xa0 [ 216.928384][T19772] FAULT_INJECTION: forcing a failure. [ 216.928384][T19772] name failslab, interval 1, probability 0, space 0, times 0 [ 216.929844][T19752] alloc_pipe_info+0x1ca/0x360 [ 216.929876][T19752] splice_direct_to_actor+0x636/0x690 [ 216.929905][T19752] ? fsnotify_perm+0x5a/0x380 [ 216.929926][T19752] ? security_file_permission+0x4f/0x70 [ 216.962770][T19752] ? direct_file_splice_eof+0x70/0x70 [ 216.968150][T19752] ? security_file_permission+0x5a/0x70 [ 216.973698][T19752] do_splice_direct+0x10d/0x190 [ 216.978596][T19752] ? do_splice_direct+0x190/0x190 [ 216.983620][T19752] do_sendfile+0x3c4/0x980 [ 216.988043][T19752] __x64_sys_sendfile64+0x110/0x150 [ 216.993249][T19752] do_syscall_64+0x44/0x110 [ 216.997814][T19752] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.003808][T19752] RIP: 0033:0x7f1299f18ce9 [ 217.008245][T19752] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.027848][T19752] RSP: 002b:00007f129929b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 217.036279][T19752] RAX: ffffffffffffffda RBX: 00007f129a037f80 RCX: 00007f1299f18ce9 [ 217.044413][T19752] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 217.052377][T19752] RBP: 00007f129929b120 R08: 0000000000000000 R09: 0000000000000000 [ 217.060357][T19752] R10: 0000000100800001 R11: 0000000000000246 R12: 0000000000000001 14:27:21 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 2) 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 14:27:21 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1201, 0x0, 0x0, 0x600000}) 14:27:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1300, 0x0, 0x0, 0x600000}) [ 217.068418][T19752] R13: 000000000000000b R14: 00007f129a037f80 R15: 00007ffd405db338 [ 217.076721][T19752] [ 217.079729][T19772] CPU: 1 PID: 19772 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 217.090168][T19772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 217.100495][T19772] Call Trace: [ 217.103839][T19772] [ 217.106774][T19772] dump_stack_lvl+0xda/0x130 [ 217.111420][T19772] dump_stack+0x15/0x20 [ 217.115748][T19772] should_fail_ex+0x21f/0x230 14:27:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (fail_nth: 3) 14:27:21 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) [ 217.120449][T19772] ? __alloc_skb+0x109/0x2e0 [ 217.125099][T19772] __should_failslab+0x92/0xa0 [ 217.130354][T19772] should_failslab+0x9/0x20 [ 217.135053][T19772] kmem_cache_alloc_node+0x52/0x280 [ 217.140390][T19772] __alloc_skb+0x109/0x2e0 [ 217.144860][T19772] netlink_sendmsg+0x483/0x770 [ 217.149633][T19772] ? netlink_getsockopt+0x3e0/0x3e0 [ 217.154838][T19772] ____sys_sendmsg+0x37c/0x4d0 [ 217.159794][T19772] __sys_sendmsg+0x1e9/0x270 [ 217.164506][T19772] __x64_sys_sendmsg+0x46/0x50 14:27:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1301, 0x0, 0x0, 0x600000}) [ 217.169286][T19772] do_syscall_64+0x44/0x110 [ 217.173849][T19772] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.179756][T19772] RIP: 0033:0x7f4feb1a7ce9 [ 217.184206][T19772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.186620][T19779] bridge0: port 2(ipvlan9) entered blocking state [ 217.203810][T19772] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) [ 217.203833][T19772] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 217.203844][T19772] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 217.203855][T19772] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 217.210316][T19779] bridge0: port 2(ipvlan9) entered disabled state [ 217.218637][T19772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.218650][T19772] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 217.218733][T19772] [ 217.227519][T19779] ipvlan9: entered allmulticast mode [ 217.273516][T19779] bridge0: entered allmulticast mode [ 217.293175][T19785] FAULT_INJECTION: forcing a failure. [ 217.293175][T19785] name failslab, interval 1, probability 0, space 0, times 0 [ 217.296368][T19779] ipvlan9: left allmulticast mode [ 217.305868][T19785] CPU: 1 PID: 19785 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0xef4bac4056ba493c, 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x10b03, 0x100) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0/../file0\x00'}) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:21 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 3) 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) pipe(&(0x7f0000000100)) 14:27:21 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 4) [ 217.305891][T19785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 217.305901][T19785] Call Trace: [ 217.310961][T19779] bridge0: left allmulticast mode [ 217.321396][T19785] [ 217.321404][T19785] dump_stack_lvl+0xda/0x130 [ 217.321437][T19785] dump_stack+0x15/0x20 [ 217.351543][T19785] should_fail_ex+0x21f/0x230 [ 217.356308][T19785] ? copy_splice_read+0xc7/0x4b0 [ 217.361263][T19785] __should_failslab+0x92/0xa0 [ 217.366069][T19785] should_failslab+0x9/0x20 [ 217.370590][T19785] __kmem_cache_alloc_node+0x4e/0x210 [ 217.375879][T19796] FAULT_INJECTION: forcing a failure. [ 217.375879][T19796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.376021][T19785] ? copy_splice_read+0xc7/0x4b0 [ 217.394136][T19785] __kmalloc+0x95/0x1a0 [ 217.398325][T19785] copy_splice_read+0xc7/0x4b0 [ 217.403109][T19785] ? avc_policy_seqno+0x15/0x20 [ 217.408022][T19785] ? selinux_file_permission+0x22b/0x360 [ 217.413650][T19785] ? fsnotify_perm+0x306/0x380 [ 217.418531][T19785] ? splice_shrink_spd+0x60/0x60 [ 217.423483][T19785] splice_direct_to_actor+0x28c/0x690 [ 217.428887][T19785] ? direct_file_splice_eof+0x70/0x70 [ 217.434318][T19785] ? security_file_permission+0x5a/0x70 [ 217.439922][T19785] do_splice_direct+0x10d/0x190 [ 217.444935][T19785] ? do_splice_direct+0x190/0x190 [ 217.450014][T19785] do_sendfile+0x3c4/0x980 [ 217.454496][T19785] __x64_sys_sendfile64+0x110/0x150 [ 217.459764][T19785] do_syscall_64+0x44/0x110 [ 217.464266][T19785] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.470192][T19785] RIP: 0033:0x7f1299f18ce9 [ 217.474618][T19785] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.494224][T19785] RSP: 002b:00007f129929b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 217.502679][T19785] RAX: ffffffffffffffda RBX: 00007f129a037f80 RCX: 00007f1299f18ce9 [ 217.510648][T19785] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 217.518609][T19785] RBP: 00007f129929b120 R08: 0000000000000000 R09: 0000000000000000 [ 217.526629][T19785] R10: 0000000100800001 R11: 0000000000000246 R12: 0000000000000001 [ 217.535464][T19785] R13: 000000000000000b R14: 00007f129a037f80 R15: 00007ffd405db338 [ 217.543429][T19785] [ 217.546503][T19796] CPU: 0 PID: 19796 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 217.556934][T19796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 217.567006][T19796] Call Trace: 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) 14:27:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (fail_nth: 4) 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) 14:27:21 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnexthop={0x20, 0x6a, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004840}, 0x0) [ 217.570288][T19796] [ 217.573309][T19796] dump_stack_lvl+0xda/0x130 [ 217.578010][T19796] dump_stack+0x15/0x20 [ 217.582262][T19796] should_fail_ex+0x21f/0x230 [ 217.587111][T19796] should_fail+0xb/0x10 [ 217.591306][T19796] should_fail_usercopy+0x1a/0x20 [ 217.596367][T19796] _copy_from_iter+0xf2/0xb60 [ 217.601134][T19796] ? kmalloc_reserve+0xfb/0x190 [ 217.605992][T19796] ? __build_skb_around+0x196/0x1f0 [ 217.611264][T19796] ? __virt_addr_valid+0x16a/0x1b0 [ 217.616377][T19796] ? __check_object_size+0x364/0x510 [ 217.621650][T19796] netlink_sendmsg+0x53c/0x770 [ 217.626489][T19796] ? netlink_getsockopt+0x3e0/0x3e0 [ 217.631694][T19796] ____sys_sendmsg+0x37c/0x4d0 [ 217.636498][T19796] __sys_sendmsg+0x1e9/0x270 [ 217.641106][T19796] __x64_sys_sendmsg+0x46/0x50 [ 217.645913][T19796] do_syscall_64+0x44/0x110 [ 217.650653][T19796] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.656592][T19796] RIP: 0033:0x7f4feb1a7ce9 [ 217.661001][T19796] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.680676][T19796] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 217.689181][T19796] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 217.697181][T19796] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 217.705169][T19796] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 217.713196][T19796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.721181][T19796] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 217.729150][T19796] [ 217.752423][T19806] EXT4-fs: 68 callbacks suppressed [ 217.752438][T19806] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:22 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1400, 0x0, 0x0, 0x600000}) 14:27:22 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 5) 14:27:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0xef4bac4056ba493c, 0x0) (async) r0 = open(&(0x7f0000000080)='./file1\x00', 0x10b03, 0x100) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0/../file0\x00'}) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) [ 217.770566][T19806] FAULT_INJECTION: forcing a failure. [ 217.770566][T19806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 217.783943][T19806] CPU: 0 PID: 19806 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 217.794458][T19806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 217.804553][T19806] Call Trace: [ 217.807957][T19806] [ 217.810891][T19806] dump_stack_lvl+0xda/0x130 [ 217.815499][T19806] dump_stack+0x15/0x20 14:27:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1401, 0x0, 0x0, 0x600000}) [ 217.819683][T19806] should_fail_ex+0x21f/0x230 [ 217.824414][T19806] __should_fail_alloc_page+0xfd/0x110 [ 217.829960][T19806] __alloc_pages_bulk+0x106/0x6b0 [ 217.835022][T19806] ? __kmalloc+0x95/0x1a0 [ 217.839370][T19806] copy_splice_read+0xfa/0x4b0 [ 217.844263][T19806] ? selinux_file_permission+0x22b/0x360 [ 217.849949][T19806] ? fsnotify_perm+0x306/0x380 [ 217.854752][T19806] ? splice_shrink_spd+0x60/0x60 [ 217.859738][T19806] splice_direct_to_actor+0x28c/0x690 [ 217.865212][T19806] ? direct_file_splice_eof+0x70/0x70 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) pipe(&(0x7f0000000100)) [ 217.870792][T19806] ? security_file_permission+0x5a/0x70 [ 217.876374][T19806] do_splice_direct+0x10d/0x190 [ 217.881271][T19806] ? do_splice_direct+0x190/0x190 [ 217.886336][T19806] do_sendfile+0x3c4/0x980 [ 217.890791][T19806] __x64_sys_sendfile64+0x110/0x150 [ 217.892747][T19815] FAULT_INJECTION: forcing a failure. [ 217.892747][T19815] name failslab, interval 1, probability 0, space 0, times 0 [ 217.896088][T19806] do_syscall_64+0x44/0x110 [ 217.913193][T19806] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 217.919090][T19806] RIP: 0033:0x7f1299f18ce9 [ 217.923563][T19806] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.943250][T19806] RSP: 002b:00007f129929b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 217.951728][T19806] RAX: ffffffffffffffda RBX: 00007f129a037f80 RCX: 00007f1299f18ce9 [ 217.959692][T19806] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 217.967721][T19806] RBP: 00007f129929b120 R08: 0000000000000000 R09: 0000000000000000 [ 217.975692][T19806] R10: 0000000100800001 R11: 0000000000000246 R12: 0000000000000001 [ 217.983657][T19806] R13: 000000000000000b R14: 00007f129a037f80 R15: 00007ffd405db338 [ 217.991633][T19806] [ 217.994919][T19815] CPU: 1 PID: 19815 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 218.005349][T19815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 218.015449][T19815] Call Trace: [ 218.018783][T19815] 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (fail_nth: 5) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket(0x2, 0x80805, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 218.021730][T19815] dump_stack_lvl+0xda/0x130 [ 218.026395][T19815] dump_stack+0x15/0x20 [ 218.030747][T19815] should_fail_ex+0x21f/0x230 [ 218.035606][T19815] ? skb_clone+0x154/0x1e0 [ 218.040115][T19815] __should_failslab+0x92/0xa0 [ 218.044899][T19815] should_failslab+0x9/0x20 [ 218.049515][T19815] kmem_cache_alloc+0x4e/0x250 [ 218.054286][T19815] skb_clone+0x154/0x1e0 [ 218.058613][T19815] __netlink_deliver_tap+0x2c0/0x4c0 [ 218.063992][T19815] netlink_unicast+0x62f/0x650 [ 218.068780][T19815] netlink_sendmsg+0x66e/0x770 [ 218.073626][T19815] ? netlink_getsockopt+0x3e0/0x3e0 [ 218.078859][T19815] ____sys_sendmsg+0x37c/0x4d0 [ 218.083684][T19815] __sys_sendmsg+0x1e9/0x270 [ 218.088271][T19815] __x64_sys_sendmsg+0x46/0x50 [ 218.093063][T19815] do_syscall_64+0x44/0x110 [ 218.097792][T19815] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 218.103744][T19815] RIP: 0033:0x7f4feb1a7ce9 [ 218.108240][T19815] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 218.127927][T19815] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.136407][T19815] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 218.144382][T19815] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 218.152463][T19815] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 218.160470][T19815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.168440][T19815] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 218.176413][T19815] 14:27:22 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1500, 0x0, 0x0, 0x600000}) [ 218.199796][T19815] ipvlan22: entered promiscuous mode [ 218.205360][T19833] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 218.220785][T19833] FAULT_INJECTION: forcing a failure. [ 218.220785][T19833] name failslab, interval 1, probability 0, space 0, times 0 [ 218.233619][T19833] CPU: 0 PID: 19833 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 218.244075][T19833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 218.254139][T19833] Call Trace: [ 218.257492][T19833] [ 218.260423][T19833] dump_stack_lvl+0xda/0x130 [ 218.265128][T19833] dump_stack+0x15/0x20 [ 218.269296][T19833] should_fail_ex+0x21f/0x230 [ 218.274132][T19833] ? kvmalloc_node+0x72/0x160 [ 218.278821][T19833] __should_failslab+0x92/0xa0 [ 218.283633][T19833] should_failslab+0x9/0x20 [ 218.288231][T19833] __kmem_cache_alloc_node+0x4e/0x210 [ 218.293727][T19833] ? kvmalloc_node+0x72/0x160 [ 218.298433][T19833] __kmalloc_node+0x98/0x1a0 [ 218.303029][T19833] ? __rcu_read_unlock+0x4d/0x70 [ 218.307949][T19833] kvmalloc_node+0x72/0x160 [ 218.312441][T19833] seq_read_iter+0x14a/0x8f0 [ 218.317029][T19833] ? _raw_spin_unlock+0x26/0x40 [ 218.321999][T19833] ? __alloc_pages_bulk+0x58c/0x6b0 [ 218.327181][T19833] copy_splice_read+0x26b/0x4b0 [ 218.332044][T19833] ? splice_shrink_spd+0x60/0x60 [ 218.337032][T19833] splice_direct_to_actor+0x28c/0x690 [ 218.342462][T19833] ? direct_file_splice_eof+0x70/0x70 [ 218.347937][T19833] ? security_file_permission+0x5a/0x70 [ 218.353535][T19833] do_splice_direct+0x10d/0x190 [ 218.358459][T19833] ? do_splice_direct+0x190/0x190 [ 218.363488][T19833] do_sendfile+0x3c4/0x980 [ 218.367893][T19833] __x64_sys_sendfile64+0x110/0x150 [ 218.373120][T19833] do_syscall_64+0x44/0x110 [ 218.377649][T19833] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 218.383621][T19833] RIP: 0033:0x7f1299f18ce9 [ 218.388015][T19833] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 218.407646][T19833] RSP: 002b:00007f129929b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 218.416265][T19833] RAX: ffffffffffffffda RBX: 00007f129a037f80 RCX: 00007f1299f18ce9 [ 218.424320][T19833] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 218.432361][T19833] RBP: 00007f129929b120 R08: 0000000000000000 R09: 0000000000000000 [ 218.440419][T19833] R10: 0000000100800001 R11: 0000000000000246 R12: 0000000000000001 [ 218.448376][T19833] R13: 000000000000000b R14: 00007f129a037f80 R15: 00007ffd405db338 [ 218.456334][T19833] [ 218.473144][T19835] bridge0: port 2(ipvlan9) entered blocking state [ 218.479655][T19835] bridge0: port 2(ipvlan9) entered disabled state [ 218.486317][T19835] ipvlan9: entered allmulticast mode [ 218.491662][T19835] bridge0: entered allmulticast mode 14:27:22 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 6) 14:27:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0xef4bac4056ba493c, 0x0) (async) r0 = open(&(0x7f0000000080)='./file1\x00', 0x10b03, 0x100) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0/../file0\x00'}) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (fail_nth: 6) 14:27:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1501, 0x0, 0x0, 0x600000}) [ 218.497617][T19835] ipvlan9: left allmulticast mode [ 218.502731][T19835] bridge0: left allmulticast mode [ 218.532913][T19849] FAULT_INJECTION: forcing a failure. [ 218.532913][T19849] name failslab, interval 1, probability 0, space 0, times 0 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) mount$bind(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400), 0x800008, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) renameat2(r2, &(0x7f0000000180)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x5) sendfile(r1, r0, 0x0, 0x100800001) [ 218.545646][T19849] CPU: 1 PID: 19849 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 218.556142][T19849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 218.566338][T19849] Call Trace: [ 218.569624][T19849] [ 218.572569][T19849] dump_stack_lvl+0xda/0x130 [ 218.577190][T19849] dump_stack+0x15/0x20 [ 218.581374][T19849] should_fail_ex+0x21f/0x230 [ 218.586132][T19849] ? rtnl_newlink+0x5d/0x1670 [ 218.590911][T19849] __should_failslab+0x92/0xa0 [ 218.595697][T19849] should_failslab+0x9/0x20 14:27:22 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 218.600216][T19849] __kmem_cache_alloc_node+0x4e/0x210 [ 218.605612][T19849] ? rtnl_newlink+0x5d/0x1670 [ 218.610370][T19849] kmalloc_trace+0x2a/0xa0 [ 218.614823][T19849] rtnl_newlink+0x5d/0x1670 [ 218.619347][T19849] ? __rcu_read_unlock+0x4d/0x70 [ 218.624304][T19849] ? avc_has_perm_noaudit+0x1c8/0x210 [ 218.629834][T19849] ? selinux_capable+0x1f2/0x250 [ 218.635057][T19849] ? security_capable+0x5e/0x80 [ 218.639899][T19849] ? ns_capable+0x7c/0xb0 [ 218.644212][T19849] ? rtnl_setlink+0x300/0x300 [ 218.648939][T19849] rtnetlink_rcv_msg+0x807/0x8c0 [ 218.653879][T19849] ? memcg_account_kmem+0x121/0x140 [ 218.659080][T19849] ? __rcu_read_unlock+0x4d/0x70 [ 218.664115][T19849] ? mod_objcg_state+0x357/0x580 [ 218.669102][T19849] ? slab_post_alloc_hook+0x82/0x2f0 [ 218.674430][T19849] ? kmem_cache_free+0x1d9/0x380 [ 218.678105][T19862] FAULT_INJECTION: forcing a failure. [ 218.678105][T19862] name failslab, interval 1, probability 0, space 0, times 0 [ 218.679348][T19849] ? __kfree_skb+0x104/0x140 [ 218.679371][T19849] ? nlmon_xmit+0x4b/0x60 [ 218.700876][T19849] ? __kfree_skb+0x104/0x140 [ 218.705521][T19849] ? consume_skb+0x57/0x180 [ 218.710014][T19849] ? nlmon_xmit+0x4b/0x60 [ 218.714338][T19849] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 218.719732][T19849] ? __dev_queue_xmit+0xaae/0x1d80 [ 218.724835][T19849] ? ref_tracker_free+0x3a1/0x400 [ 218.729852][T19849] netlink_rcv_skb+0x126/0x220 [ 218.734625][T19849] ? rtnetlink_bind+0x60/0x60 [ 218.739293][T19849] rtnetlink_rcv+0x1c/0x20 [ 218.743712][T19849] netlink_unicast+0x589/0x650 [ 218.748580][T19849] netlink_sendmsg+0x66e/0x770 [ 218.753397][T19849] ? netlink_getsockopt+0x3e0/0x3e0 [ 218.758587][T19849] ____sys_sendmsg+0x37c/0x4d0 [ 218.763396][T19849] __sys_sendmsg+0x1e9/0x270 [ 218.767985][T19849] __x64_sys_sendmsg+0x46/0x50 [ 218.772743][T19849] do_syscall_64+0x44/0x110 [ 218.777245][T19849] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 218.783191][T19849] RIP: 0033:0x7f4feb1a7ce9 [ 218.787597][T19849] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 218.807197][T19849] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.815770][T19849] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 218.823809][T19849] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 218.831833][T19849] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 218.839796][T19849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.847850][T19849] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 218.855823][T19849] [ 218.858883][T19862] CPU: 0 PID: 19862 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 218.869344][T19862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 218.879404][T19862] Call Trace: [ 218.882769][T19862] [ 218.885793][T19862] dump_stack_lvl+0xda/0x130 [ 218.890451][T19862] dump_stack+0x15/0x20 [ 218.894626][T19862] should_fail_ex+0x21f/0x230 [ 218.899301][T19862] ? cgroup_show_path+0x6a/0x240 [ 218.904248][T19862] __should_failslab+0x92/0xa0 [ 218.909065][T19862] should_failslab+0x9/0x20 [ 218.913558][T19862] __kmem_cache_alloc_node+0x4e/0x210 [ 218.918989][T19862] ? cgroup_finalize_control+0x970/0x970 [ 218.924622][T19862] ? cgroup_show_path+0x6a/0x240 [ 218.929554][T19862] kmalloc_trace+0x2a/0xa0 [ 218.934023][T19862] cgroup_show_path+0x6a/0x240 [ 218.938781][T19862] ? kernfs_sop_show_path+0x99/0xe0 [ 218.944060][T19862] ? cgroup_finalize_control+0x970/0x970 [ 218.949675][T19862] kernfs_sop_show_path+0xa5/0xe0 [ 218.954737][T19862] ? kernfs_sop_show_options+0xb0/0xb0 [ 218.960281][T19862] show_mountinfo+0x108/0x510 [ 218.964970][T19862] m_show+0x38/0x40 [ 218.968838][T19862] seq_read_iter+0x612/0x8f0 [ 218.973492][T19862] copy_splice_read+0x26b/0x4b0 [ 218.978398][T19862] ? splice_shrink_spd+0x60/0x60 [ 218.983395][T19862] splice_direct_to_actor+0x28c/0x690 [ 218.988759][T19862] ? direct_file_splice_eof+0x70/0x70 [ 218.994129][T19862] ? security_file_permission+0x5a/0x70 [ 218.999663][T19862] do_splice_direct+0x10d/0x190 [ 219.004578][T19862] ? do_splice_direct+0x190/0x190 [ 219.009591][T19862] do_sendfile+0x3c4/0x980 [ 219.014069][T19862] __x64_sys_sendfile64+0x110/0x150 [ 219.019278][T19862] do_syscall_64+0x44/0x110 [ 219.023869][T19862] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 219.029848][T19862] RIP: 0033:0x7f1299f18ce9 [ 219.034262][T19862] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 219.054052][T19862] RSP: 002b:00007f12992590c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 219.062482][T19862] RAX: ffffffffffffffda RBX: 00007f129a038120 RCX: 00007f1299f18ce9 [ 219.070456][T19862] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 219.078508][T19862] RBP: 00007f1299259120 R08: 0000000000000000 R09: 0000000000000000 [ 219.086518][T19862] R10: 0000000100800001 R11: 0000000000000246 R12: 0000000000000001 [ 219.094512][T19862] R13: 000000000000006e R14: 00007f129a038120 R15: 00007ffd405db338 14:27:23 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:23 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 7) 14:27:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1600, 0x0, 0x0, 0x600000}) [ 219.102474][T19862] [ 219.111761][T19848] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 219.123953][T19859] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 219.139157][T19873] FAULT_INJECTION: forcing a failure. [ 219.139157][T19873] name failslab, interval 1, probability 0, space 0, times 0 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 219.151936][T19873] CPU: 1 PID: 19873 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 219.162419][T19873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 219.172632][T19873] Call Trace: [ 219.175922][T19873] [ 219.178881][T19873] dump_stack_lvl+0xda/0x130 [ 219.183528][T19873] dump_stack+0x15/0x20 [ 219.187673][T19873] should_fail_ex+0x21f/0x230 [ 219.192382][T19873] ? kvmalloc_node+0x72/0x160 [ 219.197119][T19873] __should_failslab+0x92/0xa0 [ 219.201913][T19873] should_failslab+0x9/0x20 [ 219.206402][T19873] __kmem_cache_alloc_node+0x4e/0x210 [ 219.211857][T19873] ? kvmalloc_node+0x72/0x160 [ 219.216538][T19873] __kmalloc_node+0x98/0x1a0 [ 219.221181][T19873] kvmalloc_node+0x72/0x160 [ 219.225688][T19873] alloc_netdev_mqs+0x89/0x8a0 [ 219.230528][T19873] ? ipvlan_link_delete+0x210/0x210 [ 219.235752][T19873] rtnl_create_link+0x23b/0x810 [ 219.240745][T19873] rtnl_newlink+0xdff/0x1670 [ 219.245414][T19873] ? security_capable+0x5e/0x80 [ 219.250348][T19873] ? ns_capable+0x7c/0xb0 [ 219.254743][T19873] ? rtnl_setlink+0x300/0x300 [ 219.259499][T19873] rtnetlink_rcv_msg+0x807/0x8c0 [ 219.264443][T19873] ? memcg_list_lru_alloc+0xd5/0x750 [ 219.269816][T19873] ? mod_objcg_state+0x357/0x580 [ 219.274745][T19873] ? slab_post_alloc_hook+0x82/0x2f0 [ 219.280044][T19873] ? kmem_cache_free+0x1d9/0x380 [ 219.285030][T19873] ? __kfree_skb+0x104/0x140 [ 219.289745][T19873] ? nlmon_xmit+0x4b/0x60 [ 219.294082][T19873] ? __kfree_skb+0x104/0x140 [ 219.298727][T19873] ? consume_skb+0x57/0x180 [ 219.303480][T19873] ? nlmon_xmit+0x4b/0x60 [ 219.308058][T19873] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 219.313404][T19873] ? __dev_queue_xmit+0xaae/0x1d80 [ 219.318502][T19873] ? ref_tracker_free+0x3a1/0x400 [ 219.323521][T19873] netlink_rcv_skb+0x126/0x220 [ 219.328346][T19873] ? rtnetlink_bind+0x60/0x60 [ 219.333100][T19873] rtnetlink_rcv+0x1c/0x20 [ 219.337502][T19873] netlink_unicast+0x589/0x650 [ 219.342346][T19873] netlink_sendmsg+0x66e/0x770 [ 219.347128][T19873] ? netlink_getsockopt+0x3e0/0x3e0 [ 219.352324][T19873] ____sys_sendmsg+0x37c/0x4d0 [ 219.357240][T19873] __sys_sendmsg+0x1e9/0x270 [ 219.361831][T19873] __x64_sys_sendmsg+0x46/0x50 [ 219.366612][T19873] do_syscall_64+0x44/0x110 [ 219.371171][T19873] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 219.377063][T19873] RIP: 0033:0x7f4feb1a7ce9 [ 219.381519][T19873] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 219.401427][T19873] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.409979][T19873] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 219.417978][T19873] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 219.425939][T19873] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 219.434035][T19873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.442105][T19873] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 219.450256][T19873] 14:27:23 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 8) 14:27:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) mount$bind(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400), 0x800008, 0x0) (async) mount$bind(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400), 0x800008, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) renameat2(r2, &(0x7f0000000180)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x5) sendfile(r1, r0, 0x0, 0x100800001) 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1601, 0x0, 0x0, 0x600000}) 14:27:23 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) [ 219.463808][T19875] ipvlan9: entered promiscuous mode [ 219.500881][T19880] FAULT_INJECTION: forcing a failure. [ 219.500881][T19880] name failslab, interval 1, probability 0, space 0, times 0 [ 219.513592][T19880] CPU: 0 PID: 19880 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 219.524022][T19880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 219.534090][T19880] Call Trace: [ 219.537382][T19880] [ 219.540327][T19880] dump_stack_lvl+0xda/0x130 [ 219.544960][T19880] dump_stack+0x15/0x20 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 219.549255][T19880] should_fail_ex+0x21f/0x230 [ 219.553981][T19880] ? __hw_addr_add_ex+0x13d/0x350 [ 219.559032][T19880] __should_failslab+0x92/0xa0 [ 219.563989][T19880] should_failslab+0x9/0x20 [ 219.568564][T19880] __kmem_cache_alloc_node+0x4e/0x210 [ 219.574134][T19880] ? __hw_addr_add_ex+0x13d/0x350 [ 219.579242][T19880] kmalloc_trace+0x2a/0xa0 [ 219.583678][T19880] __hw_addr_add_ex+0x13d/0x350 [ 219.588549][T19880] dev_addr_init+0xb2/0x120 [ 219.593175][T19880] ? stack_depot_init+0x4f/0x130 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:23 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 219.598165][T19880] alloc_netdev_mqs+0x1cc/0x8a0 [ 219.603136][T19880] ? ipvlan_link_delete+0x210/0x210 [ 219.608428][T19880] rtnl_create_link+0x23b/0x810 [ 219.613343][T19880] rtnl_newlink+0xdff/0x1670 [ 219.618012][T19880] ? security_capable+0x5e/0x80 [ 219.623052][T19880] ? ns_capable+0x7c/0xb0 [ 219.627403][T19880] ? rtnl_setlink+0x300/0x300 [ 219.632134][T19880] rtnetlink_rcv_msg+0x807/0x8c0 [ 219.637216][T19880] ? memcg_list_lru_alloc+0xd5/0x750 [ 219.642629][T19880] ? mod_objcg_state+0x357/0x580 [ 219.647634][T19880] ? slab_post_alloc_hook+0x82/0x2f0 [ 219.652936][T19880] ? kmem_cache_free+0x1d9/0x380 [ 219.658066][T19880] ? __kfree_skb+0x104/0x140 [ 219.662689][T19880] ? nlmon_xmit+0x4b/0x60 [ 219.667025][T19880] ? __kfree_skb+0x104/0x140 [ 219.671652][T19880] ? consume_skb+0x57/0x180 [ 219.676170][T19880] ? nlmon_xmit+0x4b/0x60 [ 219.680519][T19880] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 219.685984][T19880] ? __dev_queue_xmit+0xaae/0x1d80 [ 219.691123][T19880] ? ref_tracker_free+0x3a1/0x400 [ 219.696142][T19880] netlink_rcv_skb+0x126/0x220 [ 219.700930][T19880] ? rtnetlink_bind+0x60/0x60 [ 219.705616][T19880] rtnetlink_rcv+0x1c/0x20 [ 219.710135][T19880] netlink_unicast+0x589/0x650 [ 219.714935][T19880] netlink_sendmsg+0x66e/0x770 [ 219.719719][T19880] ? netlink_getsockopt+0x3e0/0x3e0 [ 219.725014][T19880] ____sys_sendmsg+0x37c/0x4d0 [ 219.729763][T19880] __sys_sendmsg+0x1e9/0x270 [ 219.734432][T19880] __x64_sys_sendmsg+0x46/0x50 [ 219.739182][T19880] do_syscall_64+0x44/0x110 [ 219.743724][T19880] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 219.749610][T19880] RIP: 0033:0x7f4feb1a7ce9 [ 219.754013][T19880] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 219.773703][T19880] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.782105][T19880] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 219.790094][T19880] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 14:27:24 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 9) [ 219.799511][T19880] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 219.807579][T19880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.815546][T19880] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 219.823610][T19880] [ 219.826845][T19886] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 219.833556][T19884] ipvlan10: entered promiscuous mode [ 219.840215][T19882] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800002) 14:27:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) mount$bind(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400), 0x800008, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) renameat2(r2, &(0x7f0000000180)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x5) sendfile(r1, r0, 0x0, 0x100800001) 14:27:24 executing program 4: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1700, 0x0, 0x0, 0x600000}) 14:27:24 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) [ 219.872492][T19910] FAULT_INJECTION: forcing a failure. [ 219.872492][T19910] name failslab, interval 1, probability 0, space 0, times 0 [ 219.885278][T19910] CPU: 0 PID: 19910 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 219.895889][T19910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 219.905999][T19910] Call Trace: [ 219.909288][T19910] [ 219.912230][T19910] dump_stack_lvl+0xda/0x130 [ 219.916881][T19910] dump_stack+0x15/0x20 14:27:24 executing program 4: socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:24 executing program 4: socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 219.921070][T19910] should_fail_ex+0x21f/0x230 [ 219.924453][T19917] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 219.925761][T19910] ? kvmalloc_node+0x72/0x160 [ 219.925791][T19910] __should_failslab+0x92/0xa0 [ 219.945070][T19910] should_failslab+0x9/0x20 [ 219.949639][T19910] __kmem_cache_alloc_node+0x4e/0x210 [ 219.955110][T19910] ? kvmalloc_node+0x72/0x160 [ 219.959852][T19910] __kmalloc_node+0x98/0x1a0 [ 219.964492][T19910] ? dev_addr_init+0xf2/0x120 14:27:24 executing program 4: socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:24 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:24 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 219.969191][T19910] kvmalloc_node+0x72/0x160 [ 219.973855][T19910] alloc_netdev_mqs+0x552/0x8a0 [ 219.978733][T19910] rtnl_create_link+0x23b/0x810 [ 219.983728][T19910] rtnl_newlink+0xdff/0x1670 [ 219.988565][T19910] ? security_capable+0x5e/0x80 [ 219.993498][T19910] ? ns_capable+0x7c/0xb0 [ 219.997887][T19910] ? rtnl_setlink+0x300/0x300 [ 220.002622][T19910] rtnetlink_rcv_msg+0x807/0x8c0 [ 220.007572][T19910] ? memcg_list_lru_alloc+0xd5/0x750 [ 220.012893][T19910] ? mod_objcg_state+0x357/0x580 [ 220.017994][T19910] ? slab_post_alloc_hook+0x82/0x2f0 14:27:24 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 220.023307][T19910] ? kmem_cache_free+0x1d9/0x380 [ 220.028266][T19910] ? __kfree_skb+0x104/0x140 [ 220.032940][T19910] ? nlmon_xmit+0x4b/0x60 [ 220.037290][T19910] ? __kfree_skb+0x104/0x140 [ 220.041978][T19910] ? consume_skb+0x57/0x180 [ 220.046806][T19910] ? nlmon_xmit+0x4b/0x60 [ 220.051144][T19910] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 220.056536][T19910] ? __dev_queue_xmit+0xaae/0x1d80 [ 220.062158][T19910] ? ref_tracker_free+0x3a1/0x400 [ 220.067277][T19910] netlink_rcv_skb+0x126/0x220 [ 220.072073][T19910] ? rtnetlink_bind+0x60/0x60 [ 220.076774][T19910] rtnetlink_rcv+0x1c/0x20 [ 220.081170][T19910] netlink_unicast+0x589/0x650 [ 220.085925][T19910] netlink_sendmsg+0x66e/0x770 [ 220.090697][T19910] ? netlink_getsockopt+0x3e0/0x3e0 [ 220.095898][T19910] ____sys_sendmsg+0x37c/0x4d0 [ 220.100716][T19910] __sys_sendmsg+0x1e9/0x270 [ 220.105306][T19910] __x64_sys_sendmsg+0x46/0x50 [ 220.110154][T19910] do_syscall_64+0x44/0x110 [ 220.114828][T19910] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 220.120761][T19910] RIP: 0033:0x7f4feb1a7ce9 [ 220.125170][T19910] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 220.145007][T19910] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.153432][T19910] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 220.161497][T19910] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 14:27:24 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 10) [ 220.169454][T19910] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 220.177476][T19910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.185444][T19910] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 220.193475][T19910] [ 220.211692][T19916] ipvlan11: entered promiscuous mode [ 220.222266][T19935] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 220.235733][T19934] FAULT_INJECTION: forcing a failure. [ 220.235733][T19934] name failslab, interval 1, probability 0, space 0, times 0 [ 220.248448][T19934] CPU: 0 PID: 19934 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 220.258888][T19934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 220.269017][T19934] Call Trace: 14:27:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800003) 14:27:24 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1701, 0x0, 0x0, 0x600000}) 14:27:24 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 14:27:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180), 0x900002, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:24 executing program 4: socket(0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 220.272302][T19934] [ 220.275219][T19934] dump_stack_lvl+0xda/0x130 [ 220.279821][T19934] dump_stack+0x15/0x20 [ 220.283979][T19934] should_fail_ex+0x21f/0x230 [ 220.288750][T19934] ? kvmalloc_node+0x72/0x160 [ 220.293451][T19934] __should_failslab+0x92/0xa0 [ 220.298275][T19934] should_failslab+0x9/0x20 [ 220.302812][T19934] __kmem_cache_alloc_node+0x4e/0x210 [ 220.308266][T19934] ? kvmalloc_node+0x72/0x160 [ 220.312960][T19934] __kmalloc_node+0x98/0x1a0 [ 220.317690][T19934] ? dev_addr_init+0xf2/0x120 14:27:24 executing program 4: socket(0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 220.322381][T19934] kvmalloc_node+0x72/0x160 [ 220.326954][T19934] alloc_netdev_mqs+0x6d9/0x8a0 [ 220.331827][T19934] rtnl_create_link+0x23b/0x810 [ 220.336708][T19934] rtnl_newlink+0xdff/0x1670 [ 220.341652][T19934] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 220.347959][T19934] ? _raw_spin_unlock+0x26/0x40 [ 220.352827][T19934] ? __mutex_lock+0x21c/0x8d0 [ 220.357603][T19934] ? rtnl_setlink+0x300/0x300 [ 220.362294][T19934] rtnetlink_rcv_msg+0x807/0x8c0 [ 220.367306][T19934] ? memcg_list_lru_alloc+0xd5/0x750 14:27:24 executing program 4: socket(0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:24 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 220.372725][T19934] ? mod_objcg_state+0x44e/0x580 [ 220.377708][T19934] ? slab_post_alloc_hook+0x82/0x2f0 [ 220.383086][T19934] ? kmem_cache_free+0x1d9/0x380 [ 220.388040][T19934] ? __kfree_skb+0x104/0x140 [ 220.392644][T19934] ? nlmon_xmit+0x4b/0x60 [ 220.396988][T19934] ? __kfree_skb+0x104/0x140 [ 220.401654][T19934] ? consume_skb+0x57/0x180 [ 220.406256][T19934] ? nlmon_xmit+0x4b/0x60 [ 220.410595][T19934] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 220.415957][T19934] ? __dev_queue_xmit+0xaae/0x1d80 14:27:24 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 220.421113][T19934] ? ref_tracker_free+0x3a1/0x400 [ 220.426157][T19934] netlink_rcv_skb+0x126/0x220 [ 220.431002][T19934] ? rtnetlink_bind+0x60/0x60 [ 220.435695][T19934] rtnetlink_rcv+0x1c/0x20 [ 220.440123][T19934] netlink_unicast+0x589/0x650 [ 220.444918][T19934] netlink_sendmsg+0x66e/0x770 [ 220.449705][T19934] ? netlink_getsockopt+0x3e0/0x3e0 [ 220.454925][T19934] ____sys_sendmsg+0x37c/0x4d0 [ 220.459734][T19934] __sys_sendmsg+0x1e9/0x270 [ 220.464364][T19934] __x64_sys_sendmsg+0x46/0x50 [ 220.469179][T19934] do_syscall_64+0x44/0x110 14:27:24 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 220.473714][T19934] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 220.479628][T19934] RIP: 0033:0x7f4feb1a7ce9 [ 220.484052][T19934] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 220.503678][T19934] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.512100][T19934] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 14:27:24 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 11) [ 220.520079][T19934] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 220.528150][T19934] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 220.536257][T19934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 220.544218][T19934] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 220.552177][T19934] [ 220.559039][T19939] ipvlan12: entered promiscuous mode [ 220.590344][T19971] FAULT_INJECTION: forcing a failure. [ 220.590344][T19971] name failslab, interval 1, probability 0, space 0, times 0 [ 220.603125][T19971] CPU: 0 PID: 19971 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 220.613743][T19971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 220.623907][T19971] Call Trace: [ 220.627177][T19971] [ 220.630118][T19971] dump_stack_lvl+0xda/0x130 [ 220.634719][T19971] dump_stack+0x15/0x20 [ 220.638871][T19971] should_fail_ex+0x21f/0x230 [ 220.643709][T19971] ? bitmap_zalloc+0x29/0x30 [ 220.648370][T19971] __should_failslab+0x92/0xa0 [ 220.653163][T19971] should_failslab+0x9/0x20 [ 220.657650][T19971] __kmem_cache_alloc_node+0x4e/0x210 [ 220.663059][T19971] ? __hw_addr_add_ex+0x13d/0x350 [ 220.668073][T19971] ? bitmap_zalloc+0x29/0x30 [ 220.672654][T19971] __kmalloc+0x95/0x1a0 [ 220.676818][T19971] bitmap_zalloc+0x29/0x30 [ 220.681286][T19971] dev_prep_valid_name+0x2b7/0x640 [ 220.686384][T19971] ? __kmem_cache_alloc_node+0x17f/0x210 [ 220.692061][T19971] ? __kmalloc_node+0x98/0x1a0 [ 220.696824][T19971] register_netdevice+0x120/0xd60 [ 220.701876][T19971] ? dev_addr_mod+0x1df/0x200 [ 220.706568][T19971] ? validate_linkmsg+0x511/0x590 [ 220.711660][T19971] ipvlan_link_new+0x295/0x5c0 [ 220.716445][T19971] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 220.722181][T19971] rtnl_newlink+0xee5/0x1670 [ 220.726880][T19971] ? security_capable+0x5e/0x80 [ 220.731719][T19971] ? ns_capable+0x7c/0xb0 [ 220.736099][T19971] ? rtnl_setlink+0x300/0x300 [ 220.740785][T19971] rtnetlink_rcv_msg+0x807/0x8c0 [ 220.745810][T19971] ? memcg_account_kmem+0x121/0x140 [ 220.751139][T19971] ? __rcu_read_unlock+0x4d/0x70 [ 220.756058][T19971] ? mod_objcg_state+0x44e/0x580 [ 220.761130][T19971] ? slab_post_alloc_hook+0x82/0x2f0 [ 220.766485][T19971] ? kmem_cache_free+0x1d9/0x380 [ 220.771425][T19971] ? __kfree_skb+0x104/0x140 [ 220.776110][T19971] ? nlmon_xmit+0x4b/0x60 [ 220.780443][T19971] ? __kfree_skb+0x104/0x140 [ 220.785107][T19971] ? consume_skb+0x57/0x180 [ 220.789598][T19971] ? nlmon_xmit+0x4b/0x60 [ 220.794004][T19971] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 220.799348][T19971] ? __dev_queue_xmit+0xaae/0x1d80 [ 220.804447][T19971] ? ref_tracker_free+0x3a1/0x400 [ 220.809492][T19971] netlink_rcv_skb+0x126/0x220 [ 220.814255][T19971] ? rtnetlink_bind+0x60/0x60 [ 220.818995][T19971] rtnetlink_rcv+0x1c/0x20 [ 220.823447][T19971] netlink_unicast+0x589/0x650 [ 220.828261][T19971] netlink_sendmsg+0x66e/0x770 [ 220.833012][T19971] ? netlink_getsockopt+0x3e0/0x3e0 [ 220.838192][T19971] ____sys_sendmsg+0x37c/0x4d0 [ 220.842988][T19971] __sys_sendmsg+0x1e9/0x270 [ 220.847646][T19971] __x64_sys_sendmsg+0x46/0x50 [ 220.852397][T19971] do_syscall_64+0x44/0x110 [ 220.856929][T19971] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 220.862806][T19971] RIP: 0033:0x7f4feb1a7ce9 [ 220.867204][T19971] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 220.886819][T19971] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.895256][T19971] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 220.903211][T19971] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 220.911217][T19971] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 220.919256][T19971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 220.927226][T19971] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 220.935231][T19971] 14:27:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800004) 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 14:27:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1800, 0x0, 0x0, 0x600000}) 14:27:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180), 0x900002, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:25 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 12) [ 220.940317][T19968] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 220.950550][T19972] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 220.990688][T19982] FAULT_INJECTION: forcing a failure. [ 220.990688][T19982] name failslab, interval 1, probability 0, space 0, times 0 [ 221.003419][T19982] CPU: 1 PID: 19982 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 221.014634][T19982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 221.024867][T19982] Call Trace: [ 221.028154][T19982] [ 221.031090][T19982] dump_stack_lvl+0xda/0x130 [ 221.035777][T19982] dump_stack+0x15/0x20 [ 221.040234][T19982] should_fail_ex+0x21f/0x230 [ 221.044933][T19982] ? register_netdevice+0x158/0xd60 [ 221.050177][T19982] __should_failslab+0x92/0xa0 [ 221.054980][T19982] should_failslab+0x9/0x20 [ 221.059588][T19982] __kmem_cache_alloc_node+0x4e/0x210 [ 221.065023][T19982] ? register_netdevice+0x158/0xd60 [ 221.070244][T19982] kmalloc_trace+0x2a/0xa0 [ 221.074765][T19982] register_netdevice+0x158/0xd60 [ 221.079817][T19982] ? dev_addr_mod+0x1df/0x200 [ 221.084515][T19982] ? validate_linkmsg+0x511/0x590 [ 221.089576][T19982] ipvlan_link_new+0x295/0x5c0 [ 221.094358][T19982] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 221.100141][T19982] rtnl_newlink+0xee5/0x1670 [ 221.104886][T19982] ? security_capable+0x5e/0x80 [ 221.109791][T19982] ? ns_capable+0x7c/0xb0 [ 221.114144][T19982] ? rtnl_setlink+0x300/0x300 [ 221.118858][T19982] rtnetlink_rcv_msg+0x807/0x8c0 [ 221.123895][T19982] ? __mod_memcg_lruvec_state+0xd4/0x140 [ 221.129552][T19982] ? __rcu_read_unlock+0x4d/0x70 [ 221.134595][T19982] ? mod_objcg_state+0x444/0x580 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180), 0x900002, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180), 0x900002, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 221.139596][T19982] ? slab_post_alloc_hook+0x82/0x2f0 [ 221.144950][T19982] ? kmem_cache_free+0x1d9/0x380 [ 221.150041][T19982] ? __kfree_skb+0x104/0x140 [ 221.154702][T19982] ? nlmon_xmit+0x4b/0x60 [ 221.159052][T19982] ? __kfree_skb+0x104/0x140 [ 221.163698][T19982] ? consume_skb+0x57/0x180 [ 221.168303][T19982] ? nlmon_xmit+0x4b/0x60 [ 221.172709][T19982] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 221.178236][T19982] ? __dev_queue_xmit+0xaae/0x1d80 [ 221.183365][T19982] ? ref_tracker_free+0x3a1/0x400 [ 221.188428][T19982] netlink_rcv_skb+0x126/0x220 [ 221.193182][T19982] ? rtnetlink_bind+0x60/0x60 [ 221.197892][T19982] rtnetlink_rcv+0x1c/0x20 [ 221.202429][T19982] netlink_unicast+0x589/0x650 [ 221.207263][T19982] netlink_sendmsg+0x66e/0x770 [ 221.212043][T19982] ? netlink_getsockopt+0x3e0/0x3e0 [ 221.217227][T19982] ____sys_sendmsg+0x37c/0x4d0 [ 221.222018][T19982] __sys_sendmsg+0x1e9/0x270 [ 221.226616][T19982] __x64_sys_sendmsg+0x46/0x50 [ 221.231380][T19982] do_syscall_64+0x44/0x110 [ 221.236159][T19982] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 221.242142][T19982] RIP: 0033:0x7f4feb1a7ce9 [ 221.246575][T19982] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 221.266294][T19982] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 221.274872][T19982] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 221.282915][T19982] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 14:27:25 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 13) 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1801, 0x0, 0x0, 0x600000}) [ 221.290943][T19982] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 221.298923][T19982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 221.306881][T19982] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 221.314908][T19982] [ 221.334191][T19987] ipvlan13: entered promiscuous mode 14:27:25 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 14:27:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800005) 14:27:25 executing program 2: mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2187015, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x5) [ 221.395457][T20036] ipvlan14: entered promiscuous mode [ 221.408656][T20035] FAULT_INJECTION: forcing a failure. [ 221.408656][T20035] name failslab, interval 1, probability 0, space 0, times 0 [ 221.421329][T20035] CPU: 0 PID: 20035 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 221.431754][T20035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 221.441822][T20035] Call Trace: 14:27:25 executing program 2: mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async, rerun: 64) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 32) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2187015, 0x0) (async, rerun: 32) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x5) 14:27:25 executing program 2: mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async, rerun: 64) mount$bind(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async, rerun: 64) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2187015, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x5) 14:27:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) recvfrom$unix(r0, &(0x7f0000000380)=""/211, 0xd3, 0x120, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendfile(r1, r0, 0x0, 0x100800001) 14:27:25 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 221.445119][T20035] [ 221.448051][T20035] dump_stack_lvl+0xda/0x130 [ 221.452661][T20035] dump_stack+0x15/0x20 [ 221.456842][T20035] should_fail_ex+0x21f/0x230 [ 221.461688][T20035] ? kstrdup_const+0x3e/0x50 [ 221.466323][T20035] __should_failslab+0x92/0xa0 [ 221.471196][T20035] should_failslab+0x9/0x20 [ 221.475731][T20035] __kmem_cache_alloc_node+0x4e/0x210 [ 221.481193][T20035] ? xas_store+0x835/0xc90 [ 221.485694][T20035] ? kstrdup_const+0x3e/0x50 [ 221.490448][T20035] __kmalloc_node_track_caller+0x96/0x1a0 14:27:25 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800006) [ 221.496210][T20035] ? dump_schedule+0x470/0x470 [ 221.501132][T20035] kstrdup+0x3a/0x70 [ 221.505072][T20035] kstrdup_const+0x3e/0x50 [ 221.509509][T20035] kvasprintf_const+0xe5/0xf0 [ 221.514208][T20035] kobject_set_name_vargs+0x44/0xe0 [ 221.519453][T20035] dev_set_name+0x84/0xb0 [ 221.523873][T20035] ? hrtimer_init+0x104/0x1f0 [ 221.528566][T20035] ? netdev_register_kobject+0x63/0x230 [ 221.534190][T20035] ? device_initialize+0x1fe/0x210 [ 221.539416][T20035] netdev_register_kobject+0x7c/0x230 [ 221.544906][T20035] register_netdevice+0x86f/0xd60 [ 221.550096][T20035] ? validate_linkmsg+0x511/0x590 [ 221.555156][T20035] ipvlan_link_new+0x295/0x5c0 [ 221.559945][T20035] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 221.565681][T20035] rtnl_newlink+0xee5/0x1670 [ 221.570373][T20035] ? cgroup_rstat_updated+0x8c/0x1c0 [ 221.575934][T20035] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 221.582205][T20035] ? _raw_spin_unlock+0x26/0x40 [ 221.587071][T20035] ? __mutex_lock+0x21c/0x8d0 [ 221.591843][T20035] ? rtnl_setlink+0x300/0x300 [ 221.596577][T20035] rtnetlink_rcv_msg+0x807/0x8c0 [ 221.601512][T20035] ? memcg_list_lru_alloc+0xd5/0x750 [ 221.606840][T20035] ? mod_objcg_state+0x357/0x580 [ 221.611774][T20035] ? page_counter_try_charge+0x260/0x290 [ 221.617452][T20035] ? __refill_stock+0x7f/0xb0 [ 221.622234][T20035] ? kmem_cache_free+0x1d9/0x380 [ 221.627295][T20035] ? __kfree_skb+0x104/0x140 [ 221.631935][T20035] ? nlmon_xmit+0x4b/0x60 [ 221.636251][T20035] ? __kfree_skb+0x104/0x140 [ 221.641139][T20035] ? consume_skb+0x57/0x180 [ 221.645631][T20035] ? nlmon_xmit+0x4b/0x60 [ 221.650006][T20035] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 221.655340][T20035] ? __dev_queue_xmit+0xaae/0x1d80 [ 221.660440][T20035] ? ref_tracker_free+0x3a1/0x400 [ 221.665574][T20035] netlink_rcv_skb+0x126/0x220 [ 221.670321][T20035] ? rtnetlink_bind+0x60/0x60 [ 221.675015][T20035] rtnetlink_rcv+0x1c/0x20 [ 221.679457][T20035] netlink_unicast+0x589/0x650 [ 221.684209][T20035] netlink_sendmsg+0x66e/0x770 [ 221.689010][T20035] ? netlink_getsockopt+0x3e0/0x3e0 [ 221.694236][T20035] ____sys_sendmsg+0x37c/0x4d0 [ 221.698984][T20035] __sys_sendmsg+0x1e9/0x270 [ 221.703564][T20035] __x64_sys_sendmsg+0x46/0x50 [ 221.708337][T20035] do_syscall_64+0x44/0x110 [ 221.712896][T20035] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 221.718848][T20035] RIP: 0033:0x7f4feb1a7ce9 [ 221.723249][T20035] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:26 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 14) 14:27:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) recvfrom$unix(r0, &(0x7f0000000380)=""/211, 0xd3, 0x120, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendfile(r1, r0, 0x0, 0x100800001) (async) sendfile(r1, r0, 0x0, 0x100800001) 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1900, 0x0, 0x0, 0x600000}) [ 221.743048][T20035] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 221.751464][T20035] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 221.759631][T20035] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 221.767618][T20035] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 221.775594][T20035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 221.783545][T20035] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 221.791504][T20035] 14:27:26 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:27:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800008) [ 221.829443][T20068] FAULT_INJECTION: forcing a failure. [ 221.829443][T20068] name failslab, interval 1, probability 0, space 0, times 0 [ 221.842221][T20068] CPU: 0 PID: 20068 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 221.852647][T20068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 221.862715][T20068] Call Trace: [ 221.866009][T20068] [ 221.868954][T20068] dump_stack_lvl+0xda/0x130 [ 221.873570][T20068] dump_stack+0x15/0x20 14:27:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) recvfrom$unix(r0, &(0x7f0000000380)=""/211, 0xd3, 0x120, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendfile(r1, r0, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) recvfrom$unix(r0, &(0x7f0000000380)=""/211, 0xd3, 0x120, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 221.877746][T20068] should_fail_ex+0x21f/0x230 [ 221.882511][T20068] ? device_add+0x88/0x8b0 [ 221.886958][T20068] __should_failslab+0x92/0xa0 [ 221.891815][T20068] should_failslab+0x9/0x20 [ 221.896339][T20068] __kmem_cache_alloc_node+0x4e/0x210 [ 221.901899][T20068] ? kobject_set_name_vargs+0xc0/0xe0 [ 221.907316][T20068] ? device_add+0x88/0x8b0 [ 221.912043][T20068] kmalloc_trace+0x2a/0xa0 [ 221.916514][T20068] device_add+0x88/0x8b0 [ 221.920821][T20068] netdev_register_kobject+0xfc/0x230 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 221.926222][T20068] register_netdevice+0x86f/0xd60 [ 221.931401][T20068] ? validate_linkmsg+0x511/0x590 [ 221.936442][T20068] ipvlan_link_new+0x295/0x5c0 [ 221.941223][T20068] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 221.947082][T20068] rtnl_newlink+0xee5/0x1670 [ 221.951883][T20068] ? security_capable+0x5e/0x80 [ 221.956790][T20068] ? ns_capable+0x7c/0xb0 [ 221.961269][T20068] ? rtnl_setlink+0x300/0x300 [ 221.966042][T20068] rtnetlink_rcv_msg+0x807/0x8c0 [ 221.970997][T20068] ? memcg_list_lru_alloc+0xd5/0x750 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 221.976312][T20068] ? mod_objcg_state+0x357/0x580 [ 221.981332][T20068] ? slab_post_alloc_hook+0x82/0x2f0 [ 221.986648][T20068] ? kmem_cache_free+0x1d9/0x380 [ 221.991606][T20068] ? __kfree_skb+0x104/0x140 [ 221.996216][T20068] ? nlmon_xmit+0x4b/0x60 [ 222.000612][T20068] ? __kfree_skb+0x104/0x140 [ 222.005312][T20068] ? consume_skb+0x57/0x180 [ 222.009824][T20068] ? nlmon_xmit+0x4b/0x60 [ 222.014253][T20068] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 222.019602][T20068] ? __dev_queue_xmit+0xaae/0x1d80 [ 222.024809][T20068] ? ref_tracker_free+0x3a1/0x400 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) [ 222.029854][T20068] ? __skb_clone+0x251/0x2f0 [ 222.034455][T20068] netlink_rcv_skb+0x126/0x220 [ 222.039236][T20068] ? rtnetlink_bind+0x60/0x60 [ 222.043932][T20068] rtnetlink_rcv+0x1c/0x20 [ 222.048443][T20068] netlink_unicast+0x589/0x650 [ 222.053296][T20068] netlink_sendmsg+0x66e/0x770 [ 222.058119][T20068] ? netlink_getsockopt+0x3e0/0x3e0 [ 222.063328][T20068] ____sys_sendmsg+0x37c/0x4d0 [ 222.068139][T20068] __sys_sendmsg+0x1e9/0x270 [ 222.072804][T20068] __x64_sys_sendmsg+0x46/0x50 [ 222.077580][T20068] do_syscall_64+0x44/0x110 [ 222.082153][T20068] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 222.088041][T20068] RIP: 0033:0x7f4feb1a7ce9 [ 222.092449][T20068] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 222.112060][T20068] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.120489][T20068] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 14:27:26 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 15) 14:27:26 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:27:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1901, 0x0, 0x0, 0x600000}) 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) 14:27:26 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 222.128474][T20068] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 222.136430][T20068] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 222.144388][T20068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.152728][T20068] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 222.160736][T20068] [ 222.217880][T20111] FAULT_INJECTION: forcing a failure. [ 222.217880][T20111] name failslab, interval 1, probability 0, space 0, times 0 [ 222.230639][T20111] CPU: 0 PID: 20111 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 222.241235][T20111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 222.251311][T20111] Call Trace: [ 222.254602][T20111] [ 222.257568][T20111] dump_stack_lvl+0xda/0x130 [ 222.262261][T20111] dump_stack+0x15/0x20 14:27:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800009) [ 222.266512][T20111] should_fail_ex+0x21f/0x230 [ 222.271254][T20111] ? device_add+0x88/0x8b0 [ 222.275708][T20111] __should_failslab+0x92/0xa0 [ 222.280500][T20111] should_failslab+0x9/0x20 [ 222.285040][T20111] __kmem_cache_alloc_node+0x4e/0x210 [ 222.290430][T20111] ? kobject_set_name_vargs+0xc0/0xe0 [ 222.295837][T20111] ? device_add+0x88/0x8b0 [ 222.300256][T20111] kmalloc_trace+0x2a/0xa0 [ 222.304660][T20111] device_add+0x88/0x8b0 [ 222.308961][T20111] netdev_register_kobject+0xfc/0x230 [ 222.314505][T20111] register_netdevice+0x86f/0xd60 [ 222.319554][T20111] ? validate_linkmsg+0x511/0x590 [ 222.324670][T20111] ipvlan_link_new+0x295/0x5c0 [ 222.329419][T20111] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 222.335213][T20111] rtnl_newlink+0xee5/0x1670 [ 222.339841][T20111] ? security_capable+0x5e/0x80 [ 222.344704][T20111] ? ns_capable+0x7c/0xb0 [ 222.349021][T20111] ? rtnl_setlink+0x300/0x300 [ 222.353814][T20111] rtnetlink_rcv_msg+0x807/0x8c0 [ 222.358767][T20111] ? memcg_list_lru_alloc+0xd5/0x750 [ 222.364188][T20111] ? mod_objcg_state+0x357/0x580 [ 222.369188][T20111] ? slab_post_alloc_hook+0x82/0x2f0 [ 222.374547][T20111] ? kmem_cache_free+0x1d9/0x380 [ 222.379526][T20111] ? __kfree_skb+0x104/0x140 [ 222.384151][T20111] ? nlmon_xmit+0x4b/0x60 [ 222.388517][T20111] ? __kfree_skb+0x104/0x140 [ 222.393101][T20111] ? consume_skb+0x57/0x180 [ 222.397632][T20111] ? nlmon_xmit+0x4b/0x60 [ 222.402020][T20111] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 222.407323][T20111] ? __dev_queue_xmit+0xaae/0x1d80 [ 222.412467][T20111] ? ref_tracker_free+0x3a1/0x400 [ 222.417570][T20111] netlink_rcv_skb+0x126/0x220 [ 222.422316][T20111] ? rtnetlink_bind+0x60/0x60 [ 222.427067][T20111] rtnetlink_rcv+0x1c/0x20 [ 222.431473][T20111] netlink_unicast+0x589/0x650 [ 222.436367][T20111] netlink_sendmsg+0x66e/0x770 [ 222.441174][T20111] ? netlink_getsockopt+0x3e0/0x3e0 [ 222.446358][T20111] ____sys_sendmsg+0x37c/0x4d0 [ 222.451208][T20111] __sys_sendmsg+0x1e9/0x270 [ 222.455968][T20111] __x64_sys_sendmsg+0x46/0x50 [ 222.460737][T20111] do_syscall_64+0x44/0x110 [ 222.465289][T20111] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 222.471180][T20111] RIP: 0033:0x7f4feb1a7ce9 [ 222.475579][T20111] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 222.495497][T20111] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.503897][T20111] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 14:27:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x24400, 0x80) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0/file0', [{0x20, '$&'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, '-^%+-:$#/w-'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}], 0xa, "5a8fe682288d542da1e1803df6537d72623ceb692f0b70f836c84f99041f79e8e57e9c21601b438695bc0575b9fd9d83827ae2d4684c6ddb09b8e82004cadd822d3c7f03326e9956ac1490b1675964d34944ff06a00bedb5909ef187e5e9e0778c4daa30524d6578"}, 0xe0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1a00, 0x0, 0x0, 0x600000}) 14:27:26 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 16) 14:27:26 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:26 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 222.511931][T20111] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 222.519912][T20111] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 222.527957][T20111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.535964][T20111] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 222.543969][T20111] 14:27:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180), 0x900002, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 222.595929][T20136] FAULT_INJECTION: forcing a failure. [ 222.595929][T20136] name failslab, interval 1, probability 0, space 0, times 0 [ 222.608615][T20136] CPU: 1 PID: 20136 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 222.619130][T20136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 222.629211][T20136] Call Trace: [ 222.632497][T20136] [ 222.635435][T20136] dump_stack_lvl+0xda/0x130 [ 222.640066][T20136] dump_stack+0x15/0x20 [ 222.644392][T20136] should_fail_ex+0x21f/0x230 [ 222.649166][T20136] ? kstrdup_const+0x3e/0x50 [ 222.653912][T20136] __should_failslab+0x92/0xa0 [ 222.658813][T20136] should_failslab+0x9/0x20 [ 222.663331][T20136] __kmem_cache_alloc_node+0x4e/0x210 [ 222.668810][T20136] ? kstrdup_const+0x3e/0x50 [ 222.673397][T20136] __kmalloc_node_track_caller+0x96/0x1a0 [ 222.679111][T20136] kstrdup+0x3a/0x70 [ 222.683026][T20136] kstrdup_const+0x3e/0x50 [ 222.687424][T20136] __kernfs_new_node+0x41/0x380 [ 222.692349][T20136] ? make_kgid+0x115/0x310 [ 222.696768][T20136] ? net_ns_get_ownership+0xae/0xd0 [ 222.702088][T20136] ? net_namespace+0x20/0x20 [ 222.706699][T20136] kernfs_create_dir_ns+0x62/0x150 [ 222.711897][T20136] sysfs_create_dir_ns+0xd7/0x1d0 [ 222.716941][T20136] kobject_add_internal+0x3eb/0x730 [ 222.722221][T20136] kobject_add+0xdc/0x150 [ 222.726599][T20136] ? kobject_get+0x95/0xc0 [ 222.731000][T20136] ? device_add+0x2ea/0x8b0 [ 222.735493][T20136] device_add+0x2f8/0x8b0 [ 222.739862][T20136] netdev_register_kobject+0xfc/0x230 [ 222.745296][T20136] register_netdevice+0x86f/0xd60 [ 222.750370][T20136] ? validate_linkmsg+0x511/0x590 [ 222.755401][T20136] ipvlan_link_new+0x295/0x5c0 [ 222.760199][T20136] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 222.765944][T20136] rtnl_newlink+0xee5/0x1670 [ 222.770671][T20136] ? security_capable+0x5e/0x80 [ 222.775621][T20136] ? ns_capable+0x7c/0xb0 [ 222.780027][T20136] ? rtnl_setlink+0x300/0x300 [ 222.784693][T20136] rtnetlink_rcv_msg+0x807/0x8c0 [ 222.789784][T20136] ? memcg_list_lru_alloc+0xd5/0x750 [ 222.795094][T20136] ? mod_objcg_state+0x357/0x580 [ 222.800036][T20136] ? slab_post_alloc_hook+0x82/0x2f0 [ 222.805401][T20136] ? kmem_cache_free+0x1d9/0x380 [ 222.810370][T20136] ? __kfree_skb+0x104/0x140 [ 222.814968][T20136] ? nlmon_xmit+0x4b/0x60 [ 222.819428][T20136] ? __kfree_skb+0x104/0x140 [ 222.824011][T20136] ? consume_skb+0x57/0x180 [ 222.828494][T20136] ? nlmon_xmit+0x4b/0x60 [ 222.832824][T20136] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 222.838098][T20136] ? __dev_queue_xmit+0xaae/0x1d80 [ 222.843338][T20136] ? ref_tracker_free+0x3a1/0x400 [ 222.848354][T20136] netlink_rcv_skb+0x126/0x220 [ 222.853206][T20136] ? rtnetlink_bind+0x60/0x60 [ 222.857874][T20136] rtnetlink_rcv+0x1c/0x20 [ 222.862359][T20136] netlink_unicast+0x589/0x650 [ 222.867178][T20136] netlink_sendmsg+0x66e/0x770 [ 222.871930][T20136] ? netlink_getsockopt+0x3e0/0x3e0 [ 222.877200][T20136] ____sys_sendmsg+0x37c/0x4d0 [ 222.881956][T20136] __sys_sendmsg+0x1e9/0x270 [ 222.886568][T20136] __x64_sys_sendmsg+0x46/0x50 [ 222.891370][T20136] do_syscall_64+0x44/0x110 [ 222.895913][T20136] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 222.901882][T20136] RIP: 0033:0x7f4feb1a7ce9 [ 222.906354][T20136] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 222.926050][T20136] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.934464][T20136] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 14:27:27 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1a01, 0x0, 0x0, 0x600000}) 14:27:27 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 17) 14:27:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800003) [ 222.942474][T20136] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 222.950525][T20136] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 222.958626][T20136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.966729][T20136] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 222.974796][T20136] [ 222.977974][T20136] kobject: kobject_add_internal failed for ipvlan22 (error: -12 parent: net) 14:27:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080000a) 14:27:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x24400, 0x80) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0/file0', [{0x20, '$&'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, '-^%+-:$#/w-'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}], 0xa, "5a8fe682288d542da1e1803df6537d72623ceb692f0b70f836c84f99041f79e8e57e9c21601b438695bc0575b9fd9d83827ae2d4684c6ddb09b8e82004cadd822d3c7f03326e9956ac1490b1675964d34944ff06a00bedb5909ef187e5e9e0778c4daa30524d6578"}, 0xe0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:27 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x30}}, 0x0) 14:27:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1b00, 0x0, 0x0, 0x600000}) [ 223.033408][T20148] EXT4-fs: 11 callbacks suppressed [ 223.033423][T20148] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 223.066724][T20151] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async, rerun: 64) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (rerun: 64) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async, rerun: 32) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x24400, 0x80) (rerun: 32) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0/file0', [{0x20, '$&'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, '-^%+-:$#/w-'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}], 0xa, "5a8fe682288d542da1e1803df6537d72623ceb692f0b70f836c84f99041f79e8e57e9c21601b438695bc0575b9fd9d83827ae2d4684c6ddb09b8e82004cadd822d3c7f03326e9956ac1490b1675964d34944ff06a00bedb5909ef187e5e9e0778c4daa30524d6578"}, 0xe0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:27 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x30}}, 0x0) [ 223.080176][T20145] FAULT_INJECTION: forcing a failure. [ 223.080176][T20145] name failslab, interval 1, probability 0, space 0, times 0 [ 223.092865][T20145] CPU: 0 PID: 20145 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 223.103377][T20145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 223.113628][T20145] Call Trace: [ 223.116919][T20145] [ 223.119867][T20145] dump_stack_lvl+0xda/0x130 [ 223.124593][T20145] dump_stack+0x15/0x20 [ 223.128851][T20145] should_fail_ex+0x21f/0x230 14:27:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080000b) 14:27:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) mount$bind(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400), 0x800008, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) renameat2(r2, &(0x7f0000000180)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x5) sendfile(r1, r0, 0x0, 0x100800001) [ 223.133759][T20145] ? __kernfs_new_node+0x6a/0x380 [ 223.138800][T20145] __should_failslab+0x92/0xa0 [ 223.143740][T20145] should_failslab+0x9/0x20 [ 223.148263][T20145] kmem_cache_alloc+0x4e/0x250 [ 223.153050][T20145] __kernfs_new_node+0x6a/0x380 [ 223.157904][T20145] ? make_kgid+0x115/0x310 [ 223.162320][T20145] ? net_ns_get_ownership+0xae/0xd0 [ 223.167572][T20145] ? net_namespace+0x20/0x20 [ 223.172152][T20145] kernfs_create_dir_ns+0x62/0x150 [ 223.177260][T20145] sysfs_create_dir_ns+0xd7/0x1d0 [ 223.182346][T20145] kobject_add_internal+0x3eb/0x730 [ 223.187647][T20145] kobject_add+0xdc/0x150 [ 223.191966][T20145] ? kobject_get+0x95/0xc0 [ 223.196368][T20145] ? device_add+0x2ea/0x8b0 [ 223.200928][T20145] device_add+0x2f8/0x8b0 [ 223.205686][T20145] netdev_register_kobject+0xfc/0x230 [ 223.211085][T20145] register_netdevice+0x86f/0xd60 [ 223.216203][T20145] ? validate_linkmsg+0x511/0x590 [ 223.221217][T20145] ipvlan_link_new+0x295/0x5c0 [ 223.226044][T20145] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 223.231781][T20145] rtnl_newlink+0xee5/0x1670 [ 223.236417][T20145] ? security_capable+0x5e/0x80 [ 223.241325][T20145] ? ns_capable+0x7c/0xb0 [ 223.245680][T20145] ? rtnl_setlink+0x300/0x300 [ 223.250354][T20145] rtnetlink_rcv_msg+0x807/0x8c0 [ 223.255300][T20145] ? memcg_list_lru_alloc+0xd5/0x750 [ 223.260606][T20145] ? mod_objcg_state+0x357/0x580 [ 223.265534][T20145] ? slab_post_alloc_hook+0x82/0x2f0 [ 223.270970][T20145] ? kmem_cache_free+0x1d9/0x380 [ 223.276138][T20145] ? __kfree_skb+0x104/0x140 [ 223.280825][T20145] ? nlmon_xmit+0x4b/0x60 [ 223.285319][T20145] ? __kfree_skb+0x104/0x140 [ 223.290007][T20145] ? consume_skb+0x57/0x180 [ 223.294496][T20145] ? nlmon_xmit+0x4b/0x60 [ 223.298810][T20145] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 223.304224][T20145] ? __dev_queue_xmit+0xaae/0x1d80 [ 223.309341][T20145] ? ref_tracker_free+0x3a1/0x400 [ 223.314651][T20145] netlink_rcv_skb+0x126/0x220 [ 223.319397][T20145] ? rtnetlink_bind+0x60/0x60 [ 223.324084][T20145] rtnetlink_rcv+0x1c/0x20 [ 223.328499][T20145] netlink_unicast+0x589/0x650 [ 223.333261][T20145] netlink_sendmsg+0x66e/0x770 [ 223.338025][T20145] ? netlink_getsockopt+0x3e0/0x3e0 [ 223.343234][T20145] ____sys_sendmsg+0x37c/0x4d0 [ 223.348123][T20145] __sys_sendmsg+0x1e9/0x270 [ 223.352714][T20145] __x64_sys_sendmsg+0x46/0x50 [ 223.357495][T20145] do_syscall_64+0x44/0x110 [ 223.362050][T20145] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 223.367934][T20145] RIP: 0033:0x7f4feb1a7ce9 [ 223.372440][T20145] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 223.392123][T20145] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 223.400625][T20145] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 223.408604][T20145] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 223.416597][T20145] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 223.424562][T20145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1b01, 0x0, 0x0, 0x600000}) 14:27:27 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 18) 14:27:27 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x30}}, 0x0) [ 223.432563][T20145] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 223.440576][T20145] [ 223.443640][T20145] kobject: kobject_add_internal failed for ipvlan22 (error: -12 parent: net) 14:27:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0/file0\x00', r0}, 0x18) mount$bind(&(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), 0x0, 0x0) sendfile(r1, r0, 0x0, 0x100800001) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000380), &(0x7f00000003c0), 0x2, 0x2) [ 223.481167][T20170] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 223.497166][T20173] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1c00, 0x0, 0x0, 0x600000}) 14:27:27 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 1) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:27 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 1) [ 223.527434][T20180] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 223.554946][T20181] FAULT_INJECTION: forcing a failure. [ 223.554946][T20181] name failslab, interval 1, probability 0, space 0, times 0 [ 223.567686][T20181] CPU: 1 PID: 20181 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 223.578124][T20181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 223.588174][T20181] Call Trace: [ 223.591472][T20181] [ 223.594421][T20181] dump_stack_lvl+0xda/0x130 [ 223.599033][T20181] dump_stack+0x15/0x20 [ 223.603226][T20181] should_fail_ex+0x21f/0x230 [ 223.607913][T20181] ? __kernfs_new_node+0x6a/0x380 [ 223.613006][T20181] __should_failslab+0x92/0xa0 [ 223.617853][T20181] should_failslab+0x9/0x20 [ 223.622430][T20181] kmem_cache_alloc+0x4e/0x250 [ 223.627329][T20181] __kernfs_new_node+0x6a/0x380 [ 223.632239][T20181] ? kernfs_add_one+0x330/0x390 [ 223.637082][T20181] kernfs_new_node+0x5f/0xd0 [ 223.641771][T20181] __kernfs_create_file+0x49/0x180 [ 223.647041][T20181] ? dev_attr_show+0x90/0x90 [ 223.651635][T20181] sysfs_add_file_mode_ns+0x136/0x1b0 [ 223.657035][T20181] sysfs_create_file_ns+0xd0/0x110 [ 223.662170][T20181] device_add+0x3ef/0x8b0 [ 223.666496][T20181] netdev_register_kobject+0xfc/0x230 [ 223.671898][T20181] register_netdevice+0x86f/0xd60 [ 223.676961][T20181] ? validate_linkmsg+0x511/0x590 [ 223.682137][T20181] ipvlan_link_new+0x295/0x5c0 [ 223.686906][T20181] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 223.692785][T20181] rtnl_newlink+0xee5/0x1670 [ 223.697413][T20181] ? security_capable+0x5e/0x80 [ 223.702335][T20181] ? ns_capable+0x7c/0xb0 [ 223.706661][T20181] ? rtnl_setlink+0x300/0x300 [ 223.711382][T20181] rtnetlink_rcv_msg+0x807/0x8c0 [ 223.716319][T20181] ? memcg_list_lru_alloc+0xd5/0x750 [ 223.721684][T20181] ? mod_objcg_state+0x357/0x580 [ 223.728323][T20181] ? slab_post_alloc_hook+0x82/0x2f0 [ 223.733605][T20181] ? kmem_cache_free+0x1d9/0x380 [ 223.738608][T20181] ? __kfree_skb+0x104/0x140 [ 223.743284][T20181] ? nlmon_xmit+0x4b/0x60 [ 223.747610][T20181] ? __kfree_skb+0x104/0x140 [ 223.752256][T20181] ? consume_skb+0x57/0x180 [ 223.756756][T20181] ? nlmon_xmit+0x4b/0x60 [ 223.761208][T20181] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 223.766490][T20181] ? __dev_queue_xmit+0xaae/0x1d80 [ 223.771621][T20181] ? ref_tracker_free+0x3a1/0x400 [ 223.776687][T20181] netlink_rcv_skb+0x126/0x220 [ 223.781443][T20181] ? rtnetlink_bind+0x60/0x60 [ 223.786179][T20181] rtnetlink_rcv+0x1c/0x20 [ 223.790663][T20181] netlink_unicast+0x589/0x650 [ 223.795428][T20181] netlink_sendmsg+0x66e/0x770 [ 223.800182][T20181] ? netlink_getsockopt+0x3e0/0x3e0 [ 223.805386][T20181] ____sys_sendmsg+0x37c/0x4d0 [ 223.810143][T20181] __sys_sendmsg+0x1e9/0x270 [ 223.814737][T20181] __x64_sys_sendmsg+0x46/0x50 [ 223.819552][T20181] do_syscall_64+0x44/0x110 [ 223.824054][T20181] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 223.829940][T20181] RIP: 0033:0x7f4feb1a7ce9 [ 223.834344][T20181] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 223.854208][T20181] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 223.862689][T20181] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 223.870692][T20181] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 223.878662][T20181] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 223.886650][T20181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.894612][T20181] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 223.902624][T20181] [ 223.913925][T20186] FAULT_INJECTION: forcing a failure. [ 223.913925][T20186] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.927277][T20186] CPU: 1 PID: 20186 Comm: syz-executor.3 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 223.933234][T20191] FAULT_INJECTION: forcing a failure. [ 223.933234][T20191] name failslab, interval 1, probability 0, space 0, times 0 [ 223.937839][T20186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 223.937854][T20186] Call Trace: [ 223.937861][T20186] [ 223.937868][T20186] dump_stack_lvl+0xda/0x130 [ 223.971250][T20186] dump_stack+0x15/0x20 [ 223.975425][T20186] should_fail_ex+0x21f/0x230 [ 223.980106][T20186] should_fail+0xb/0x10 [ 223.984368][T20186] should_fail_usercopy+0x1a/0x20 [ 223.989390][T20186] _copy_from_user+0x1e/0xd0 [ 223.993979][T20186] copy_msghdr_from_user+0x54/0x2a0 [ 223.999239][T20186] __sys_sendmsg+0x17d/0x270 [ 224.003965][T20186] __x64_sys_sendmsg+0x46/0x50 [ 224.008724][T20186] do_syscall_64+0x44/0x110 [ 224.013228][T20186] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 224.019123][T20186] RIP: 0033:0x7fd2962cdce9 [ 224.023527][T20186] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 224.043452][T20186] RSP: 002b:00007fd2956500c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 224.051920][T20186] RAX: ffffffffffffffda RBX: 00007fd2963ecf80 RCX: 00007fd2962cdce9 [ 224.059895][T20186] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000e [ 224.067856][T20186] RBP: 00007fd295650120 R08: 0000000000000000 R09: 0000000000000000 [ 224.075820][T20186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.083871][T20186] R13: 000000000000000b R14: 00007fd2963ecf80 R15: 00007ffd996f42a8 [ 224.091840][T20186] [ 224.094848][T20191] CPU: 0 PID: 20191 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 224.105420][T20191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 224.115497][T20191] Call Trace: [ 224.118825][T20191] [ 224.121745][T20191] dump_stack_lvl+0xda/0x130 [ 224.126334][T20191] dump_stack+0x15/0x20 [ 224.130593][T20191] should_fail_ex+0x21f/0x230 [ 224.135343][T20191] ? __kernfs_new_node+0x6a/0x380 [ 224.140717][T20191] __should_failslab+0x92/0xa0 [ 224.145484][T20191] should_failslab+0x9/0x20 [ 224.150009][T20191] kmem_cache_alloc+0x4e/0x250 [ 224.154769][T20191] ? rb_insert_color+0x280/0x290 [ 224.159712][T20191] __kernfs_new_node+0x6a/0x380 [ 224.164567][T20191] ? kernfs_add_one+0x330/0x390 [ 224.169414][T20191] kernfs_new_node+0x5f/0xd0 [ 224.174000][T20191] kernfs_create_link+0x6c/0x120 [ 224.178950][T20191] sysfs_do_create_link_sd+0x6b/0xf0 [ 224.184252][T20191] sysfs_create_link+0x51/0x70 [ 224.189049][T20191] device_add_class_symlinks+0x9a/0x1e0 [ 224.194654][T20191] device_add+0x410/0x8b0 [ 224.199191][T20191] netdev_register_kobject+0xfc/0x230 [ 224.204566][T20191] register_netdevice+0x86f/0xd60 [ 224.209717][T20191] ipvlan_link_new+0x295/0x5c0 [ 224.214473][T20191] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 224.220213][T20191] rtnl_newlink+0xee5/0x1670 [ 224.224889][T20191] ? security_capable+0x5e/0x80 [ 224.229756][T20191] ? ns_capable+0x7c/0xb0 [ 224.234091][T20191] ? rtnl_setlink+0x300/0x300 [ 224.238767][T20191] rtnetlink_rcv_msg+0x807/0x8c0 [ 224.243699][T20191] ? memcg_list_lru_alloc+0xd5/0x750 [ 224.248983][T20191] ? mod_objcg_state+0x357/0x580 [ 224.253935][T20191] ? slab_post_alloc_hook+0x82/0x2f0 [ 224.259284][T20191] ? kmem_cache_free+0x1d9/0x380 [ 224.264358][T20191] ? __kfree_skb+0x104/0x140 [ 224.269042][T20191] ? nlmon_xmit+0x4b/0x60 [ 224.273430][T20191] ? __kfree_skb+0x104/0x140 [ 224.278085][T20191] ? consume_skb+0x57/0x180 [ 224.282586][T20191] ? nlmon_xmit+0x4b/0x60 [ 224.286913][T20191] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 224.292391][T20191] ? __dev_queue_xmit+0xaae/0x1d80 [ 224.297576][T20191] ? ref_tracker_free+0x3a1/0x400 [ 224.302612][T20191] netlink_rcv_skb+0x126/0x220 [ 224.307435][T20191] ? rtnetlink_bind+0x60/0x60 [ 224.312107][T20191] rtnetlink_rcv+0x1c/0x20 [ 224.316586][T20191] netlink_unicast+0x589/0x650 [ 224.321350][T20191] netlink_sendmsg+0x66e/0x770 [ 224.326154][T20191] ? netlink_getsockopt+0x3e0/0x3e0 [ 224.331372][T20191] ____sys_sendmsg+0x37c/0x4d0 [ 224.336146][T20191] __sys_sendmsg+0x1e9/0x270 [ 224.340747][T20191] __x64_sys_sendmsg+0x46/0x50 [ 224.345598][T20191] do_syscall_64+0x44/0x110 [ 224.350106][T20191] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 224.355997][T20191] RIP: 0033:0x7f4feb1a7ce9 [ 224.360407][T20191] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:28 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 19) [ 224.380092][T20191] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 224.388517][T20191] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 224.396555][T20191] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 224.404579][T20191] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 224.412541][T20191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 224.420602][T20191] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 224.428655][T20191] 14:27:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1c01, 0x0, 0x0, 0x600000}) 14:27:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080000c) 14:27:28 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 2) 14:27:28 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 20) 14:27:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async, rerun: 64) mount$bind(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (rerun: 64) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async, rerun: 64) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x1) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0/file0\x00', r0}, 0x18) (async, rerun: 32) mount$bind(&(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), 0x0, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000380), &(0x7f00000003c0), 0x2, 0x2) [ 224.490245][T20195] FAULT_INJECTION: forcing a failure. [ 224.490245][T20195] name failslab, interval 1, probability 0, space 0, times 0 [ 224.503027][T20195] CPU: 0 PID: 20195 Comm: syz-executor.3 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 224.504053][T20188] FAULT_INJECTION: forcing a failure. [ 224.504053][T20188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.513432][T20195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 224.513447][T20195] Call Trace: [ 224.513455][T20195] [ 224.513461][T20195] dump_stack_lvl+0xda/0x130 [ 224.547329][T20195] dump_stack+0x15/0x20 [ 224.551518][T20195] should_fail_ex+0x21f/0x230 [ 224.556302][T20195] ? __alloc_skb+0x109/0x2e0 [ 224.560965][T20195] __should_failslab+0x92/0xa0 [ 224.565737][T20195] should_failslab+0x9/0x20 [ 224.570243][T20195] kmem_cache_alloc_node+0x52/0x280 [ 224.575482][T20195] __alloc_skb+0x109/0x2e0 [ 224.579890][T20195] netlink_sendmsg+0x483/0x770 [ 224.584675][T20195] ? netlink_getsockopt+0x3e0/0x3e0 [ 224.589976][T20195] ____sys_sendmsg+0x37c/0x4d0 [ 224.594745][T20195] __sys_sendmsg+0x1e9/0x270 [ 224.599335][T20195] __x64_sys_sendmsg+0x46/0x50 [ 224.604197][T20195] do_syscall_64+0x44/0x110 [ 224.608757][T20195] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 224.614731][T20195] RIP: 0033:0x7fd2962cdce9 [ 224.619157][T20195] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 224.638846][T20195] RSP: 002b:00007fd2956500c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 224.647339][T20195] RAX: ffffffffffffffda RBX: 00007fd2963ecf80 RCX: 00007fd2962cdce9 [ 224.655332][T20195] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000e [ 224.663322][T20195] RBP: 00007fd295650120 R08: 0000000000000000 R09: 0000000000000000 [ 224.671342][T20195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.679302][T20195] R13: 000000000000000b R14: 00007fd2963ecf80 R15: 00007ffd996f42a8 [ 224.687480][T20195] [ 224.690488][T20188] CPU: 1 PID: 20188 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 224.700915][T20188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 224.706845][T20204] FAULT_INJECTION: forcing a failure. [ 224.706845][T20204] name failslab, interval 1, probability 0, space 0, times 0 [ 224.710958][T20188] Call Trace: [ 224.710968][T20188] [ 224.710974][T20188] dump_stack_lvl+0xda/0x130 [ 224.734770][T20188] dump_stack+0x15/0x20 [ 224.738991][T20188] should_fail_ex+0x21f/0x230 [ 224.743724][T20188] should_fail+0xb/0x10 [ 224.747884][T20188] should_fail_usercopy+0x1a/0x20 [ 224.752971][T20188] _copy_from_user+0x1e/0xd0 [ 224.757574][T20188] do_handle_open+0x6c/0x3d0 [ 224.762162][T20188] __x64_sys_open_by_handle_at+0x46/0x50 [ 224.767839][T20188] do_syscall_64+0x44/0x110 [ 224.772340][T20188] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 224.778360][T20188] RIP: 0033:0x7fbc0d2a7ce9 [ 224.782854][T20188] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 224.802454][T20188] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 224.810902][T20188] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 224.818908][T20188] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 224.827025][T20188] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 224.835074][T20188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.843129][T20188] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 224.851411][T20188] [ 224.854595][T20204] CPU: 0 PID: 20204 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 224.862648][T20199] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 224.865041][T20204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 224.865055][T20204] Call Trace: [ 224.865063][T20204] 14:27:29 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 3) 14:27:29 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 4) 14:27:29 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 2) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080000d) [ 224.865069][T20204] dump_stack_lvl+0xda/0x130 [ 224.895873][T20204] dump_stack+0x15/0x20 [ 224.900108][T20204] should_fail_ex+0x21f/0x230 [ 224.905070][T20204] ? kstrdup_const+0x3e/0x50 [ 224.909681][T20204] __should_failslab+0x92/0xa0 [ 224.914468][T20204] should_failslab+0x9/0x20 [ 224.919044][T20204] __kmem_cache_alloc_node+0x4e/0x210 [ 224.924489][T20204] ? kernfs_xattr_get+0x67/0x80 [ 224.929352][T20204] ? kstrdup_const+0x3e/0x50 [ 224.933969][T20204] __kmalloc_node_track_caller+0x96/0x1a0 [ 224.939758][T20204] kstrdup+0x3a/0x70 [ 224.943676][T20204] kstrdup_const+0x3e/0x50 [ 224.948178][T20204] __kernfs_new_node+0x41/0x380 [ 224.953133][T20204] ? rb_insert_color+0x6a/0x290 [ 224.958003][T20204] ? up_write+0x30/0xe0 [ 224.962255][T20204] ? kernfs_activate+0x252/0x270 [ 224.967253][T20204] kernfs_new_node+0x5f/0xd0 [ 224.971937][T20204] kernfs_create_link+0x6c/0x120 [ 224.973450][T20216] FAULT_INJECTION: forcing a failure. [ 224.973450][T20216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.976872][T20204] sysfs_do_create_link_sd+0x6b/0xf0 [ 224.976903][T20204] sysfs_create_link+0x51/0x70 [ 225.000153][T20204] device_add_class_symlinks+0x159/0x1e0 [ 225.005792][T20204] device_add+0x410/0x8b0 [ 225.010206][T20204] netdev_register_kobject+0xfc/0x230 [ 225.015687][T20204] register_netdevice+0x86f/0xd60 [ 225.020710][T20204] ? validate_linkmsg+0x511/0x590 [ 225.025774][T20204] ipvlan_link_new+0x295/0x5c0 [ 225.030547][T20204] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 225.036309][T20204] rtnl_newlink+0xee5/0x1670 [ 225.040950][T20204] ? security_capable+0x5e/0x80 [ 225.045873][T20204] ? ns_capable+0x7c/0xb0 [ 225.050253][T20204] ? rtnl_setlink+0x300/0x300 [ 225.054961][T20204] rtnetlink_rcv_msg+0x807/0x8c0 [ 225.059968][T20204] ? memcg_list_lru_alloc+0xd5/0x750 [ 225.065264][T20204] ? mod_objcg_state+0x357/0x580 [ 225.070196][T20204] ? slab_post_alloc_hook+0x82/0x2f0 [ 225.075539][T20204] ? kmem_cache_free+0x1d9/0x380 [ 225.080504][T20204] ? __kfree_skb+0x104/0x140 [ 225.085085][T20204] ? nlmon_xmit+0x4b/0x60 [ 225.089495][T20204] ? __kfree_skb+0x104/0x140 [ 225.094072][T20204] ? consume_skb+0x57/0x180 [ 225.098701][T20204] ? nlmon_xmit+0x4b/0x60 [ 225.103093][T20204] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 225.108443][T20204] ? __dev_queue_xmit+0xaae/0x1d80 [ 225.113648][T20204] ? ref_tracker_free+0x3a1/0x400 [ 225.118699][T20204] netlink_rcv_skb+0x126/0x220 [ 225.123563][T20204] ? rtnetlink_bind+0x60/0x60 [ 225.128405][T20204] rtnetlink_rcv+0x1c/0x20 [ 225.132812][T20204] netlink_unicast+0x589/0x650 [ 225.137700][T20204] netlink_sendmsg+0x66e/0x770 [ 225.142454][T20204] ? netlink_getsockopt+0x3e0/0x3e0 [ 225.147646][T20204] ____sys_sendmsg+0x37c/0x4d0 [ 225.152444][T20204] __sys_sendmsg+0x1e9/0x270 [ 225.157080][T20204] __x64_sys_sendmsg+0x46/0x50 [ 225.162085][T20204] do_syscall_64+0x44/0x110 [ 225.166675][T20204] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 225.173001][T20204] RIP: 0033:0x7f4feb1a7ce9 [ 225.177404][T20204] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 225.197004][T20204] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 225.205418][T20204] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 225.213492][T20204] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 225.221567][T20204] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 225.229584][T20204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:29 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 21) [ 225.237596][T20204] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 225.245562][T20204] [ 225.248580][T20216] CPU: 1 PID: 20216 Comm: syz-executor.3 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 225.259016][T20216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 225.269080][T20216] Call Trace: [ 225.272470][T20216] [ 225.275409][T20216] dump_stack_lvl+0xda/0x130 [ 225.280093][T20216] dump_stack+0x15/0x20 [ 225.282875][T20222] FAULT_INJECTION: forcing a failure. [ 225.282875][T20222] name failslab, interval 1, probability 0, space 0, times 0 [ 225.284298][T20216] should_fail_ex+0x21f/0x230 [ 225.301601][T20216] should_fail+0xb/0x10 [ 225.305767][T20216] should_fail_usercopy+0x1a/0x20 [ 225.311067][T20216] _copy_from_iter+0xf2/0xb60 [ 225.315741][T20216] ? kmalloc_reserve+0xfb/0x190 [ 225.320637][T20216] ? __build_skb_around+0x196/0x1f0 [ 225.325833][T20216] ? __virt_addr_valid+0x16a/0x1b0 [ 225.330937][T20216] ? __check_object_size+0x364/0x510 [ 225.336278][T20216] netlink_sendmsg+0x53c/0x770 [ 225.341047][T20216] ? netlink_getsockopt+0x3e0/0x3e0 [ 225.346235][T20216] ____sys_sendmsg+0x37c/0x4d0 [ 225.351034][T20216] __sys_sendmsg+0x1e9/0x270 [ 225.355623][T20216] __x64_sys_sendmsg+0x46/0x50 [ 225.360839][T20216] do_syscall_64+0x44/0x110 [ 225.365417][T20216] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 225.371375][T20216] RIP: 0033:0x7fd2962cdce9 [ 225.375860][T20216] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 225.395522][T20216] RSP: 002b:00007fd2956500c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 225.403975][T20216] RAX: ffffffffffffffda RBX: 00007fd2963ecf80 RCX: 00007fd2962cdce9 [ 225.411953][T20216] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000e [ 225.419916][T20216] RBP: 00007fd295650120 R08: 0000000000000000 R09: 0000000000000000 [ 225.427877][T20216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.435837][T20216] R13: 000000000000000b R14: 00007fd2963ecf80 R15: 00007ffd996f42a8 [ 225.443895][T20216] [ 225.446929][T20222] CPU: 0 PID: 20222 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 225.457434][T20222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 225.460024][T20217] FAULT_INJECTION: forcing a failure. [ 225.460024][T20217] name failslab, interval 1, probability 0, space 0, times 0 [ 225.467727][T20222] Call Trace: [ 225.467738][T20222] [ 225.467745][T20222] dump_stack_lvl+0xda/0x130 [ 225.491213][T20222] dump_stack+0x15/0x20 [ 225.495369][T20222] should_fail_ex+0x21f/0x230 [ 225.500083][T20222] ? __kernfs_new_node+0x6a/0x380 [ 225.505178][T20222] __should_failslab+0x92/0xa0 [ 225.509946][T20222] should_failslab+0x9/0x20 [ 225.514576][T20222] kmem_cache_alloc+0x4e/0x250 [ 225.519403][T20222] __kernfs_new_node+0x6a/0x380 [ 225.524279][T20222] ? rb_insert_color+0x6a/0x290 [ 225.529124][T20222] ? up_write+0x30/0xe0 [ 225.533287][T20222] ? kernfs_activate+0x252/0x270 [ 225.538231][T20222] kernfs_new_node+0x5f/0xd0 [ 225.542831][T20222] kernfs_create_link+0x6c/0x120 [ 225.548188][T20222] sysfs_do_create_link_sd+0x6b/0xf0 [ 225.553495][T20222] sysfs_create_link+0x51/0x70 [ 225.558258][T20222] device_add_class_symlinks+0x159/0x1e0 [ 225.563906][T20222] device_add+0x410/0x8b0 [ 225.568323][T20222] netdev_register_kobject+0xfc/0x230 [ 225.573803][T20222] register_netdevice+0x86f/0xd60 [ 225.578879][T20222] ? validate_linkmsg+0x511/0x590 [ 225.583946][T20222] ipvlan_link_new+0x295/0x5c0 [ 225.588703][T20222] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 225.594570][T20222] rtnl_newlink+0xee5/0x1670 [ 225.599346][T20222] ? security_capable+0x5e/0x80 [ 225.604236][T20222] ? ns_capable+0x7c/0xb0 [ 225.608632][T20222] ? rtnl_setlink+0x300/0x300 [ 225.613374][T20222] rtnetlink_rcv_msg+0x807/0x8c0 [ 225.619558][T20222] ? memcg_list_lru_alloc+0xd5/0x750 [ 225.624951][T20222] ? mod_objcg_state+0x357/0x580 [ 225.630040][T20222] ? slab_post_alloc_hook+0x82/0x2f0 [ 225.635387][T20222] ? kmem_cache_free+0x1d9/0x380 [ 225.640321][T20222] ? __kfree_skb+0x104/0x140 [ 225.644927][T20222] ? nlmon_xmit+0x4b/0x60 [ 225.649249][T20222] ? __kfree_skb+0x104/0x140 [ 225.653868][T20222] ? consume_skb+0x57/0x180 [ 225.658366][T20222] ? nlmon_xmit+0x4b/0x60 [ 225.662727][T20222] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 225.668044][T20222] ? __dev_queue_xmit+0xaae/0x1d80 [ 225.673188][T20222] ? ref_tracker_free+0x3a1/0x400 [ 225.678382][T20222] netlink_rcv_skb+0x126/0x220 [ 225.683153][T20222] ? rtnetlink_bind+0x60/0x60 [ 225.687976][T20222] rtnetlink_rcv+0x1c/0x20 [ 225.692657][T20222] netlink_unicast+0x589/0x650 [ 225.697464][T20222] netlink_sendmsg+0x66e/0x770 [ 225.702262][T20222] ? netlink_getsockopt+0x3e0/0x3e0 [ 225.707496][T20222] ____sys_sendmsg+0x37c/0x4d0 [ 225.712372][T20222] __sys_sendmsg+0x1e9/0x270 [ 225.716994][T20222] __x64_sys_sendmsg+0x46/0x50 [ 225.721749][T20222] do_syscall_64+0x44/0x110 [ 225.726252][T20222] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 225.732277][T20222] RIP: 0033:0x7f4feb1a7ce9 [ 225.736685][T20222] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 225.757241][T20222] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 225.765725][T20222] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 225.773708][T20222] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 225.781667][T20222] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 14:27:30 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1d00, 0x0, 0x0, 0x600000}) 14:27:30 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 22) [ 225.789630][T20222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 225.797934][T20222] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 225.806062][T20222] [ 225.809088][T20217] CPU: 1 PID: 20217 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 225.819609][T20217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 225.829668][T20217] Call Trace: [ 225.832958][T20217] [ 225.835889][T20217] dump_stack_lvl+0xda/0x130 [ 225.840553][T20217] dump_stack+0x15/0x20 14:27:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1d01, 0x0, 0x0, 0x600000}) 14:27:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async, rerun: 32) mount$bind(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async, rerun: 32) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async, rerun: 32) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async, rerun: 32) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x1) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0/file0\x00', r0}, 0x18) mount$bind(&(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), 0x0, 0x0) (async, rerun: 64) sendfile(r1, r0, 0x0, 0x100800001) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000380), &(0x7f00000003c0), 0x2, 0x2) [ 225.844730][T20217] should_fail_ex+0x21f/0x230 [ 225.849512][T20217] ? do_handle_open+0x108/0x3d0 [ 225.854396][T20217] __should_failslab+0x92/0xa0 [ 225.859260][T20217] should_failslab+0x9/0x20 [ 225.863783][T20217] __kmem_cache_alloc_node+0x4e/0x210 [ 225.869230][T20217] ? do_handle_open+0x108/0x3d0 [ 225.874112][T20217] __kmalloc+0x95/0x1a0 [ 225.878344][T20217] do_handle_open+0x108/0x3d0 [ 225.883050][T20217] __x64_sys_open_by_handle_at+0x46/0x50 [ 225.888883][T20217] do_syscall_64+0x44/0x110 [ 225.893661][T20217] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 225.897916][T20228] ipvlan15: entered promiscuous mode [ 225.899560][T20217] RIP: 0033:0x7fbc0d2a7ce9 [ 225.899577][T20217] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 225.899595][T20217] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 [ 225.906937][T20228] bridge0: port 2(ipvlan15) entered blocking state [ 225.909251][T20217] ORIG_RAX: 0000000000000130 [ 225.909259][T20217] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 225.909323][T20217] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 225.929002][T20228] bridge0: port 2(ipvlan15) entered disabled state [ 225.934976][T20217] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 225.944066][T20228] ipvlan15: entered allmulticast mode [ 225.946097][T20217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.954106][T20228] bridge0: entered allmulticast mode 14:27:30 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 3) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 225.962118][T20217] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 225.962136][T20217] [ 226.015590][T20228] ipvlan15: left allmulticast mode [ 226.020850][T20228] bridge0: left allmulticast mode [ 226.026132][T20235] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 226.030871][T20232] FAULT_INJECTION: forcing a failure. [ 226.030871][T20232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.049057][T20232] CPU: 1 PID: 20232 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 226.059484][T20232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 226.069539][T20232] Call Trace: [ 226.072817][T20232] [ 226.075751][T20232] dump_stack_lvl+0xda/0x130 [ 226.080460][T20232] dump_stack+0x15/0x20 [ 226.084610][T20232] should_fail_ex+0x21f/0x230 [ 226.089316][T20232] should_fail+0xb/0x10 [ 226.093515][T20232] should_fail_usercopy+0x1a/0x20 [ 226.098533][T20232] _copy_from_user+0x1e/0xd0 [ 226.103156][T20232] do_handle_open+0x16e/0x3d0 [ 226.107936][T20232] __x64_sys_open_by_handle_at+0x46/0x50 [ 226.113567][T20232] do_syscall_64+0x44/0x110 [ 226.118079][T20232] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 226.124042][T20232] RIP: 0033:0x7fbc0d2a7ce9 [ 226.128454][T20232] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 226.148079][T20232] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 226.156473][T20232] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 226.164444][T20232] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 226.172447][T20232] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 226.180417][T20232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.188387][T20232] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 14:27:30 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 4) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 226.196359][T20232] [ 226.223308][T20229] FAULT_INJECTION: forcing a failure. [ 226.223308][T20229] name failslab, interval 1, probability 0, space 0, times 0 [ 226.236059][T20229] CPU: 1 PID: 20229 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 226.246554][T20229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 226.256675][T20229] Call Trace: [ 226.259941][T20229] [ 226.262880][T20229] dump_stack_lvl+0xda/0x130 [ 226.267509][T20229] dump_stack+0x15/0x20 [ 226.271763][T20229] should_fail_ex+0x21f/0x230 [ 226.276503][T20229] ? __kernfs_new_node+0x6a/0x380 [ 226.281534][T20229] __should_failslab+0x92/0xa0 [ 226.286292][T20229] should_failslab+0x9/0x20 [ 226.290785][T20229] kmem_cache_alloc+0x4e/0x250 [ 226.295615][T20229] __kernfs_new_node+0x6a/0x380 [ 226.300520][T20229] ? rb_insert_color+0x6a/0x290 [ 226.305419][T20229] ? up_write+0x30/0xe0 [ 226.309652][T20229] ? kernfs_activate+0x252/0x270 [ 226.314636][T20229] kernfs_new_node+0x5f/0xd0 [ 226.319331][T20229] kernfs_create_link+0x6c/0x120 [ 226.324464][T20229] sysfs_do_create_link_sd+0x6b/0xf0 [ 226.329766][T20229] sysfs_create_link+0x51/0x70 [ 226.334688][T20229] device_add_class_symlinks+0x159/0x1e0 [ 226.340389][T20229] device_add+0x410/0x8b0 [ 226.344831][T20229] netdev_register_kobject+0xfc/0x230 [ 226.350255][T20229] register_netdevice+0x86f/0xd60 [ 226.355305][T20229] ? validate_linkmsg+0x511/0x590 [ 226.360399][T20229] ipvlan_link_new+0x295/0x5c0 [ 226.365162][T20229] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 226.370878][T20229] rtnl_newlink+0xee5/0x1670 [ 226.375576][T20229] ? cgroup_rstat_updated+0x8c/0x1c0 [ 226.380994][T20229] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 226.387442][T20229] ? _raw_spin_unlock+0x26/0x40 [ 226.392430][T20229] ? __mutex_lock+0x21c/0x8d0 [ 226.397105][T20229] ? rtnl_setlink+0x300/0x300 [ 226.401821][T20229] rtnetlink_rcv_msg+0x807/0x8c0 [ 226.406971][T20229] ? memcg_list_lru_alloc+0xd5/0x750 [ 226.412373][T20229] ? mod_objcg_state+0x357/0x580 [ 226.417301][T20229] ? slab_post_alloc_hook+0x82/0x2f0 [ 226.422576][T20229] ? kmem_cache_free+0x1d9/0x380 [ 226.427499][T20229] ? __kfree_skb+0x104/0x140 [ 226.432084][T20229] ? nlmon_xmit+0x4b/0x60 [ 226.436482][T20229] ? __kfree_skb+0x104/0x140 [ 226.441119][T20229] ? consume_skb+0x57/0x180 [ 226.445765][T20229] ? nlmon_xmit+0x4b/0x60 [ 226.450099][T20229] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 226.455410][T20229] ? __dev_queue_xmit+0xaae/0x1d80 [ 226.460583][T20229] ? ref_tracker_free+0x3a1/0x400 [ 226.465625][T20229] netlink_rcv_skb+0x126/0x220 [ 226.470374][T20229] ? rtnetlink_bind+0x60/0x60 [ 226.475050][T20229] rtnetlink_rcv+0x1c/0x20 [ 226.479464][T20229] netlink_unicast+0x589/0x650 [ 226.484231][T20229] netlink_sendmsg+0x66e/0x770 [ 226.489082][T20229] ? netlink_getsockopt+0x3e0/0x3e0 [ 226.494282][T20229] ____sys_sendmsg+0x37c/0x4d0 [ 226.499186][T20229] __sys_sendmsg+0x1e9/0x270 [ 226.503776][T20229] __x64_sys_sendmsg+0x46/0x50 [ 226.508625][T20229] do_syscall_64+0x44/0x110 [ 226.513241][T20229] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 226.519219][T20229] RIP: 0033:0x7f4feb1a7ce9 [ 226.523621][T20229] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 226.543352][T20229] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 226.551804][T20229] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 226.560150][T20229] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 14:27:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1e00, 0x0, 0x0, 0x600000}) 14:27:30 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 23) 14:27:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$nfs(&(0x7f0000000380)='\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x1020000, &(0x7f00000004c0)={[{'#('}, {'('}, {'$,$]'}, {'\xff\xff\xff\xff\xff\xff'}, {'PPPPPP'}, {'@P\x00'}, {'mountinfo\x00'}, {}, {'!(/!\''}, {'\\)%,$^\'+\xe7\\,^^'}], [{@hash}, {@dont_hash}, {@dont_hash}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) mknodat$loop(r0, &(0x7f0000000080)='./file0/file0\x00', 0x4, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r4, &(0x7f0000000440)={0x10002008}) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x1) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r6 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r6, r5, 0x0, 0x100800001) 14:27:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080000f) [ 226.568147][T20229] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 226.576120][T20229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 226.584119][T20229] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 226.592232][T20229] [ 226.639513][T20247] FAULT_INJECTION: forcing a failure. [ 226.639513][T20247] name failslab, interval 1, probability 0, space 0, times 0 [ 226.651059][T20243] FAULT_INJECTION: forcing a failure. [ 226.651059][T20243] name failslab, interval 1, probability 0, space 0, times 0 [ 226.652451][T20247] CPU: 0 PID: 20247 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 226.675502][T20247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 226.685564][T20247] Call Trace: [ 226.688869][T20247] [ 226.691789][T20247] dump_stack_lvl+0xda/0x130 [ 226.696467][T20247] dump_stack+0x15/0x20 [ 226.700682][T20247] should_fail_ex+0x21f/0x230 [ 226.705355][T20247] ? __kernfs_new_node+0x6a/0x380 [ 226.710370][T20247] __should_failslab+0x92/0xa0 [ 226.715158][T20247] should_failslab+0x9/0x20 [ 226.719729][T20247] kmem_cache_alloc+0x4e/0x250 [ 226.724488][T20247] ? __radix_tree_replace+0x1c1/0x1f0 [ 226.729911][T20247] __kernfs_new_node+0x6a/0x380 [ 226.734755][T20247] ? __radix_tree_replace+0x1c1/0x1f0 [ 226.740138][T20247] ? mutex_lock+0xd/0x30 [ 226.744394][T20247] ? kernfs_xattr_get+0x67/0x80 [ 226.749234][T20247] kernfs_new_node+0x5f/0xd0 [ 226.753816][T20247] __kernfs_create_file+0x49/0x180 [ 226.758997][T20247] ? dev_attr_show+0x90/0x90 [ 226.763580][T20247] sysfs_add_file_mode_ns+0x136/0x1b0 [ 226.768945][T20247] internal_create_group+0x2e4/0x800 [ 226.774225][T20247] sysfs_create_groups+0x3c/0xe0 [ 226.779159][T20247] device_add_attrs+0x69/0x400 [ 226.783919][T20247] ? kobject_put+0xd8/0x160 [ 226.788416][T20247] device_add+0x431/0x8b0 [ 226.792825][T20247] netdev_register_kobject+0xfc/0x230 [ 226.798195][T20247] register_netdevice+0x86f/0xd60 [ 226.803293][T20247] ? validate_linkmsg+0x511/0x590 [ 226.808324][T20247] ipvlan_link_new+0x295/0x5c0 [ 226.813211][T20247] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 226.818945][T20247] rtnl_newlink+0xee5/0x1670 [ 226.823538][T20247] ? security_capable+0x5e/0x80 [ 226.828384][T20247] ? ns_capable+0x7c/0xb0 [ 226.832709][T20247] ? rtnl_setlink+0x300/0x300 [ 226.837400][T20247] rtnetlink_rcv_msg+0x807/0x8c0 [ 226.842337][T20247] ? memcg_list_lru_alloc+0xd5/0x750 [ 226.847635][T20247] ? mod_objcg_state+0x357/0x580 [ 226.852570][T20247] ? slab_post_alloc_hook+0x82/0x2f0 [ 226.857969][T20247] ? kmem_cache_free+0x1d9/0x380 [ 226.862959][T20247] ? __kfree_skb+0x104/0x140 [ 226.867626][T20247] ? nlmon_xmit+0x4b/0x60 [ 226.871961][T20247] ? __kfree_skb+0x104/0x140 [ 226.876636][T20247] ? consume_skb+0x57/0x180 [ 226.881199][T20247] ? nlmon_xmit+0x4b/0x60 [ 226.885540][T20247] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 226.890828][T20247] ? __dev_queue_xmit+0xaae/0x1d80 [ 226.896017][T20247] ? ref_tracker_free+0x3a1/0x400 [ 226.901295][T20247] netlink_rcv_skb+0x126/0x220 [ 226.906088][T20247] ? rtnetlink_bind+0x60/0x60 [ 226.910759][T20247] rtnetlink_rcv+0x1c/0x20 [ 226.915162][T20247] netlink_unicast+0x589/0x650 [ 226.919923][T20247] netlink_sendmsg+0x66e/0x770 [ 226.924763][T20247] ? netlink_getsockopt+0x3e0/0x3e0 [ 226.929951][T20247] ____sys_sendmsg+0x37c/0x4d0 [ 226.934711][T20247] __sys_sendmsg+0x1e9/0x270 [ 226.939314][T20247] __x64_sys_sendmsg+0x46/0x50 [ 226.944105][T20247] do_syscall_64+0x44/0x110 [ 226.948607][T20247] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 226.954540][T20247] RIP: 0033:0x7f4feb1a7ce9 [ 226.958955][T20247] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 226.978697][T20247] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 226.987158][T20247] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 226.995118][T20247] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 227.003083][T20247] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 227.011045][T20247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 227.019021][T20247] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 227.026986][T20247] [ 227.029993][T20243] CPU: 1 PID: 20243 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 227.040422][T20243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 227.050555][T20243] Call Trace: [ 227.053903][T20243] [ 227.056836][T20243] dump_stack_lvl+0xda/0x130 [ 227.061461][T20243] dump_stack+0x15/0x20 [ 227.065678][T20243] should_fail_ex+0x21f/0x230 [ 227.070488][T20243] __should_failslab+0x92/0xa0 [ 227.075349][T20243] should_failslab+0x9/0x20 [ 227.079848][T20243] slab_pre_alloc_hook+0x37/0x160 [ 227.084871][T20243] ? __d_alloc+0x3d/0x380 [ 227.089293][T20243] kmem_cache_alloc_lru+0x47/0x200 [ 227.094421][T20243] __d_alloc+0x3d/0x380 [ 227.098583][T20243] __d_obtain_alias+0xaa/0xf0 [ 227.103309][T20243] ? ext4_nfs_commit_metadata+0x130/0x130 [ 227.109097][T20243] d_obtain_alias+0x1a/0x20 [ 227.113597][T20243] generic_fh_to_dentry+0x85/0x90 [ 227.118694][T20243] ext4_fh_to_dentry+0x33/0x40 [ 227.123486][T20243] ? ext4_shutdown+0x20/0x20 [ 227.128155][T20243] exportfs_decode_fh_raw+0xb0/0x400 [ 227.133486][T20243] ? kstrtouint+0x77/0xb0 [ 227.137809][T20243] ? do_handle_open+0x3d0/0x3d0 [ 227.142786][T20243] ? do_handle_open+0x3d0/0x3d0 [ 227.147711][T20243] exportfs_decode_fh+0x3c/0x70 [ 227.152584][T20243] do_handle_open+0x2df/0x3d0 [ 227.157258][T20243] __x64_sys_open_by_handle_at+0x46/0x50 [ 227.162909][T20243] do_syscall_64+0x44/0x110 [ 227.167450][T20243] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 227.173438][T20243] RIP: 0033:0x7fbc0d2a7ce9 [ 227.178016][T20243] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 227.197870][T20243] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 227.206303][T20243] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 227.214266][T20243] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 227.222252][T20243] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 227.230391][T20243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:27:31 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1e01, 0x0, 0x0, 0x600000}) [ 227.238391][T20243] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 227.246797][T20243] [ 227.277457][T20252] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 227.285756][T20258] ipvlan15: entered promiscuous mode 14:27:31 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 24) 14:27:31 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 5) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 227.294359][T20256] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 227.309442][T20258] bridge0: port 2(ipvlan15) entered blocking state [ 227.316153][T20258] bridge0: port 2(ipvlan15) entered disabled state [ 227.322977][T20258] ipvlan15: entered allmulticast mode [ 227.328443][T20258] bridge0: entered allmulticast mode [ 227.334119][T20258] ipvlan15: left allmulticast mode [ 227.339304][T20258] bridge0: left allmulticast mode [ 227.384913][T20260] FAULT_INJECTION: forcing a failure. [ 227.384913][T20260] name failslab, interval 1, probability 0, space 0, times 0 [ 227.388064][T20264] FAULT_INJECTION: forcing a failure. [ 227.388064][T20264] name failslab, interval 1, probability 0, space 0, times 0 [ 227.397676][T20260] CPU: 1 PID: 20260 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 227.420667][T20260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 227.430783][T20260] Call Trace: [ 227.434051][T20260] [ 227.436968][T20260] dump_stack_lvl+0xda/0x130 [ 227.441558][T20260] dump_stack+0x15/0x20 [ 227.445713][T20260] should_fail_ex+0x21f/0x230 [ 227.450423][T20260] ? __kernfs_new_node+0x6a/0x380 [ 227.455474][T20260] __should_failslab+0x92/0xa0 [ 227.460309][T20260] should_failslab+0x9/0x20 [ 227.464881][T20260] kmem_cache_alloc+0x4e/0x250 [ 227.469651][T20260] __kernfs_new_node+0x6a/0x380 [ 227.474542][T20260] ? rb_insert_color+0x263/0x290 [ 227.479535][T20260] ? up_write+0x30/0xe0 [ 227.483691][T20260] ? kernfs_activate+0x252/0x270 [ 227.488642][T20260] kernfs_new_node+0x5f/0xd0 [ 227.493282][T20260] __kernfs_create_file+0x49/0x180 [ 227.498394][T20260] ? dev_attr_show+0x90/0x90 [ 227.503158][T20260] sysfs_add_file_mode_ns+0x136/0x1b0 [ 227.508593][T20260] internal_create_group+0x2e4/0x800 [ 227.513889][T20260] sysfs_create_groups+0x3c/0xe0 [ 227.518823][T20260] device_add_attrs+0x69/0x400 [ 227.523582][T20260] ? kobject_put+0xd8/0x160 [ 227.528082][T20260] device_add+0x431/0x8b0 [ 227.532495][T20260] netdev_register_kobject+0xfc/0x230 [ 227.537944][T20260] register_netdevice+0x86f/0xd60 [ 227.542967][T20260] ? validate_linkmsg+0x511/0x590 [ 227.548169][T20260] ipvlan_link_new+0x295/0x5c0 [ 227.552965][T20260] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 227.558709][T20260] rtnl_newlink+0xee5/0x1670 [ 227.563388][T20260] ? cgroup_rstat_updated+0x8c/0x1c0 [ 227.568722][T20260] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 227.574978][T20260] ? _raw_spin_unlock+0x26/0x40 [ 227.579980][T20260] ? __mutex_lock+0x21c/0x8d0 [ 227.584654][T20260] ? rtnl_setlink+0x300/0x300 [ 227.589364][T20260] rtnetlink_rcv_msg+0x807/0x8c0 [ 227.594293][T20260] ? memcg_list_lru_alloc+0xd5/0x750 [ 227.599576][T20260] ? mod_objcg_state+0x357/0x580 [ 227.604607][T20260] ? slab_post_alloc_hook+0x82/0x2f0 [ 227.609921][T20260] ? kmem_cache_free+0x1d9/0x380 [ 227.614850][T20260] ? __kfree_skb+0x104/0x140 [ 227.619429][T20260] ? nlmon_xmit+0x4b/0x60 [ 227.623762][T20260] ? __kfree_skb+0x104/0x140 [ 227.628352][T20260] ? consume_skb+0x57/0x180 [ 227.632877][T20260] ? nlmon_xmit+0x4b/0x60 [ 227.637210][T20260] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 227.642492][T20260] ? __dev_queue_xmit+0xaae/0x1d80 [ 227.647597][T20260] ? ref_tracker_free+0x3a1/0x400 [ 227.652718][T20260] netlink_rcv_skb+0x126/0x220 [ 227.657473][T20260] ? rtnetlink_bind+0x60/0x60 [ 227.662144][T20260] rtnetlink_rcv+0x1c/0x20 [ 227.666640][T20260] netlink_unicast+0x589/0x650 [ 227.671407][T20260] netlink_sendmsg+0x66e/0x770 [ 227.676234][T20260] ? netlink_getsockopt+0x3e0/0x3e0 [ 227.681419][T20260] ____sys_sendmsg+0x37c/0x4d0 [ 227.686175][T20260] __sys_sendmsg+0x1e9/0x270 [ 227.690813][T20260] __x64_sys_sendmsg+0x46/0x50 [ 227.695563][T20260] do_syscall_64+0x44/0x110 [ 227.700074][T20260] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 227.706045][T20260] RIP: 0033:0x7f4feb1a7ce9 [ 227.710456][T20260] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800010) [ 227.730126][T20260] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 227.738548][T20260] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 227.746595][T20260] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 227.754603][T20260] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 227.762567][T20260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 227.770767][T20260] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 227.778803][T20260] 14:27:32 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 25) 14:27:32 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1f00, 0x0, 0x0, 0x600000}) 14:27:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$nfs(&(0x7f0000000380)='\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x1020000, &(0x7f00000004c0)={[{'#('}, {'('}, {'$,$]'}, {'\xff\xff\xff\xff\xff\xff'}, {'PPPPPP'}, {'@P\x00'}, {'mountinfo\x00'}, {}, {'!(/!\''}, {'\\)%,$^\'+\xe7\\,^^'}], [{@hash}, {@dont_hash}, {@dont_hash}]}) (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async) mknodat$loop(r0, &(0x7f0000000080)='./file0/file0\x00', 0x4, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r4, &(0x7f0000000440)={0x10002008}) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x1) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r6 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r6, r5, 0x0, 0x100800001) [ 227.781875][T20264] CPU: 0 PID: 20264 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 227.792516][T20264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 227.802585][T20264] Call Trace: [ 227.805948][T20264] [ 227.808884][T20264] dump_stack_lvl+0xda/0x130 [ 227.813568][T20264] dump_stack+0x15/0x20 [ 227.817885][T20264] should_fail_ex+0x21f/0x230 [ 227.822640][T20264] ? alloc_empty_file+0xd0/0x310 [ 227.824152][T20270] FAULT_INJECTION: forcing a failure. [ 227.824152][T20270] name failslab, interval 1, probability 0, space 0, times 0 [ 227.827697][T20264] __should_failslab+0x92/0xa0 [ 227.845135][T20264] should_failslab+0x9/0x20 [ 227.849660][T20264] kmem_cache_alloc+0x4e/0x250 [ 227.854417][T20264] alloc_empty_file+0xd0/0x310 [ 227.859219][T20264] dentry_open+0x31/0xc0 [ 227.863495][T20264] exportfs_get_name+0x1d7/0x2a0 [ 227.868642][T20264] ? exportfs_decode_fh+0x70/0x70 [ 227.873730][T20264] reconnect_path+0x158/0x3e0 [ 227.878422][T20264] exportfs_decode_fh_raw+0x184/0x400 [ 227.883868][T20264] ? do_handle_open+0x3d0/0x3d0 [ 227.888726][T20264] ? do_handle_open+0x3d0/0x3d0 [ 227.893596][T20264] exportfs_decode_fh+0x3c/0x70 [ 227.898436][T20264] do_handle_open+0x2df/0x3d0 [ 227.903170][T20264] __x64_sys_open_by_handle_at+0x46/0x50 [ 227.908802][T20264] do_syscall_64+0x44/0x110 [ 227.913361][T20264] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 227.919264][T20264] RIP: 0033:0x7fbc0d2a7ce9 [ 227.923676][T20264] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 227.943271][T20264] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 227.951790][T20264] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 227.959750][T20264] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 227.967746][T20264] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 227.975766][T20264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.983727][T20264] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 227.991691][T20264] [ 227.994753][T20270] CPU: 1 PID: 20270 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 228.005269][T20270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 228.015336][T20270] Call Trace: [ 228.018625][T20270] [ 228.021561][T20270] dump_stack_lvl+0xda/0x130 [ 228.026308][T20270] dump_stack+0x15/0x20 [ 228.030585][T20270] should_fail_ex+0x21f/0x230 14:27:32 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 6) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 228.035335][T20270] ? __kernfs_new_node+0x6a/0x380 [ 228.040471][T20270] __should_failslab+0x92/0xa0 [ 228.045361][T20270] should_failslab+0x9/0x20 [ 228.049871][T20270] kmem_cache_alloc+0x4e/0x250 [ 228.054665][T20270] __kernfs_new_node+0x6a/0x380 [ 228.059598][T20270] ? rb_insert_color+0x280/0x290 [ 228.064550][T20270] ? up_write+0x30/0xe0 [ 228.065455][T20273] FAULT_INJECTION: forcing a failure. [ 228.065455][T20273] name failslab, interval 1, probability 0, space 0, times 0 [ 228.068841][T20270] ? kernfs_activate+0x252/0x270 [ 228.068866][T20270] kernfs_new_node+0x5f/0xd0 [ 228.090968][T20270] __kernfs_create_file+0x49/0x180 [ 228.096140][T20270] ? dev_attr_show+0x90/0x90 [ 228.100726][T20270] sysfs_add_file_mode_ns+0x136/0x1b0 [ 228.106204][T20270] internal_create_group+0x2e4/0x800 [ 228.111534][T20270] sysfs_create_groups+0x3c/0xe0 [ 228.116537][T20270] device_add_attrs+0x69/0x400 [ 228.121306][T20270] ? kobject_put+0xd8/0x160 [ 228.125815][T20270] device_add+0x431/0x8b0 [ 228.130149][T20270] netdev_register_kobject+0xfc/0x230 [ 228.135592][T20270] register_netdevice+0x86f/0xd60 [ 228.140616][T20270] ? validate_linkmsg+0x511/0x590 [ 228.145720][T20270] ipvlan_link_new+0x295/0x5c0 [ 228.150583][T20270] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 228.156424][T20270] rtnl_newlink+0xee5/0x1670 [ 228.161069][T20270] ? security_capable+0x5e/0x80 [ 228.165952][T20270] ? ns_capable+0x7c/0xb0 [ 228.170274][T20270] ? rtnl_setlink+0x300/0x300 [ 228.174944][T20270] rtnetlink_rcv_msg+0x807/0x8c0 [ 228.180178][T20270] ? memcg_list_lru_alloc+0xd5/0x750 [ 228.185642][T20270] ? mod_objcg_state+0x357/0x580 [ 228.190616][T20270] ? slab_post_alloc_hook+0x82/0x2f0 [ 228.195897][T20270] ? kmem_cache_free+0x1d9/0x380 [ 228.200835][T20270] ? __kfree_skb+0x104/0x140 [ 228.205521][T20270] ? nlmon_xmit+0x4b/0x60 [ 228.209894][T20270] ? __kfree_skb+0x104/0x140 [ 228.214470][T20270] ? consume_skb+0x57/0x180 [ 228.218968][T20270] ? nlmon_xmit+0x4b/0x60 [ 228.223343][T20270] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 228.228669][T20270] ? __dev_queue_xmit+0xaae/0x1d80 [ 228.233773][T20270] ? ref_tracker_free+0x3a1/0x400 [ 228.238886][T20270] netlink_rcv_skb+0x126/0x220 [ 228.243641][T20270] ? rtnetlink_bind+0x60/0x60 [ 228.248389][T20270] rtnetlink_rcv+0x1c/0x20 [ 228.252799][T20270] netlink_unicast+0x589/0x650 [ 228.257566][T20270] netlink_sendmsg+0x66e/0x770 [ 228.262453][T20270] ? netlink_getsockopt+0x3e0/0x3e0 [ 228.267678][T20270] ____sys_sendmsg+0x37c/0x4d0 [ 228.272486][T20270] __sys_sendmsg+0x1e9/0x270 [ 228.277092][T20270] __x64_sys_sendmsg+0x46/0x50 [ 228.281970][T20270] do_syscall_64+0x44/0x110 [ 228.286511][T20270] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 228.292412][T20270] RIP: 0033:0x7f4feb1a7ce9 [ 228.296815][T20270] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 228.317030][T20270] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 228.325481][T20270] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 228.333444][T20270] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 228.341458][T20270] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 228.349418][T20270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 228.357481][T20270] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 228.365445][T20270] [ 228.368453][T20273] CPU: 0 PID: 20273 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 228.378908][T20273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 228.388954][T20273] Call Trace: [ 228.392225][T20273] [ 228.395206][T20273] dump_stack_lvl+0xda/0x130 [ 228.399908][T20273] dump_stack+0x15/0x20 [ 228.404062][T20273] should_fail_ex+0x21f/0x230 [ 228.408737][T20273] ? security_file_alloc+0x32/0xd0 [ 228.413841][T20273] __should_failslab+0x92/0xa0 [ 228.418673][T20273] should_failslab+0x9/0x20 [ 228.423288][T20273] kmem_cache_alloc+0x4e/0x250 [ 228.428102][T20273] ? alloc_empty_file+0xd0/0x310 [ 228.433053][T20273] security_file_alloc+0x32/0xd0 [ 228.438039][T20273] alloc_empty_file+0x121/0x310 [ 228.442968][T20273] dentry_open+0x31/0xc0 [ 228.447268][T20273] exportfs_get_name+0x1d7/0x2a0 [ 228.452194][T20273] ? exportfs_decode_fh+0x70/0x70 [ 228.457221][T20273] reconnect_path+0x158/0x3e0 [ 228.461894][T20273] exportfs_decode_fh_raw+0x184/0x400 [ 228.467256][T20273] ? do_handle_open+0x3d0/0x3d0 [ 228.472333][T20273] ? do_handle_open+0x3d0/0x3d0 [ 228.477261][T20273] exportfs_decode_fh+0x3c/0x70 [ 228.482166][T20273] do_handle_open+0x2df/0x3d0 [ 228.486913][T20273] __x64_sys_open_by_handle_at+0x46/0x50 [ 228.492788][T20273] do_syscall_64+0x44/0x110 [ 228.497301][T20273] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 228.503191][T20273] RIP: 0033:0x7fbc0d2a7ce9 [ 228.507605][T20273] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 228.527670][T20273] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 14:27:32 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x1f01, 0x0, 0x0, 0x600000}) 14:27:32 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 228.536225][T20273] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 228.544198][T20273] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 228.552182][T20273] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 228.560304][T20273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.568265][T20273] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 228.576246][T20273] 14:27:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$nfs(&(0x7f0000000380)='\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x1020000, &(0x7f00000004c0)={[{'#('}, {'('}, {'$,$]'}, {'\xff\xff\xff\xff\xff\xff'}, {'PPPPPP'}, {'@P\x00'}, {'mountinfo\x00'}, {}, {'!(/!\''}, {'\\)%,$^\'+\xe7\\,^^'}], [{@hash}, {@dont_hash}, {@dont_hash}]}) (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) mknodat$loop(r0, &(0x7f0000000080)='./file0/file0\x00', 0x4, 0x1) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r4, &(0x7f0000000440)={0x10002008}) (async, rerun: 64) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 32) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x1) (async, rerun: 32) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r6 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r6, r5, 0x0, 0x100800001) 14:27:32 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 7) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/igmp\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:32 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 26) [ 228.612486][T20280] ipvlan15: entered promiscuous mode [ 228.619685][T20277] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 228.624411][T20280] bridge0: port 2(ipvlan15) entered blocking state [ 228.636152][T20280] bridge0: port 2(ipvlan15) entered disabled state 14:27:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/igmp\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 228.675752][T20295] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 228.677891][T20280] ipvlan15: entered allmulticast mode [ 228.691116][T20280] bridge0: entered allmulticast mode [ 228.704914][T20280] ipvlan15: left allmulticast mode [ 228.710097][T20280] bridge0: left allmulticast mode [ 228.717068][T20298] FAULT_INJECTION: forcing a failure. [ 228.717068][T20298] name failslab, interval 1, probability 0, space 0, times 0 [ 228.729739][T20298] CPU: 1 PID: 20298 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 228.740400][T20298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 228.750463][T20298] Call Trace: [ 228.753809][T20298] [ 228.756750][T20298] dump_stack_lvl+0xda/0x130 [ 228.761376][T20298] dump_stack+0x15/0x20 [ 228.765587][T20298] should_fail_ex+0x21f/0x230 [ 228.770267][T20298] ? ext4_readdir+0x2b3/0x1ac0 [ 228.775081][T20298] __should_failslab+0x92/0xa0 [ 228.779916][T20298] should_failslab+0x9/0x20 [ 228.784416][T20298] __kmem_cache_alloc_node+0x4e/0x210 [ 228.789804][T20298] ? ext4_readdir+0x2b3/0x1ac0 [ 228.794652][T20298] kmalloc_trace+0x2a/0xa0 [ 228.799085][T20298] ext4_readdir+0x2b3/0x1ac0 [ 228.803823][T20298] ? down_read_killable+0x170/0x6b0 [ 228.809029][T20298] ? fsnotify_perm+0x360/0x380 [ 228.813845][T20298] iterate_dir+0x128/0x300 [ 228.818258][T20298] exportfs_get_name+0x230/0x2a0 [ 228.823232][T20298] ? exportfs_decode_fh+0x70/0x70 [ 228.828248][T20298] reconnect_path+0x158/0x3e0 [ 228.832976][T20298] exportfs_decode_fh_raw+0x184/0x400 [ 228.838400][T20298] ? do_handle_open+0x3d0/0x3d0 [ 228.843330][T20298] ? do_handle_open+0x3d0/0x3d0 [ 228.848176][T20298] exportfs_decode_fh+0x3c/0x70 [ 228.853041][T20298] do_handle_open+0x2df/0x3d0 [ 228.857715][T20298] __x64_sys_open_by_handle_at+0x46/0x50 [ 228.863400][T20298] do_syscall_64+0x44/0x110 [ 228.867917][T20298] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 228.873854][T20298] RIP: 0033:0x7fbc0d2a7ce9 [ 228.878273][T20298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 228.897902][T20298] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 228.906363][T20298] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 228.914319][T20298] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 228.922279][T20298] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 228.930297][T20298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.938253][T20298] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 228.946348][T20298] [ 228.958234][T20297] FAULT_INJECTION: forcing a failure. [ 228.958234][T20297] name failslab, interval 1, probability 0, space 0, times 0 [ 228.970930][T20297] CPU: 1 PID: 20297 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 228.981374][T20297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 228.991421][T20297] Call Trace: [ 228.994754][T20297] [ 228.997735][T20297] dump_stack_lvl+0xda/0x130 [ 229.002320][T20297] dump_stack+0x15/0x20 [ 229.006493][T20297] should_fail_ex+0x21f/0x230 [ 229.011194][T20297] ? __kernfs_new_node+0x6a/0x380 [ 229.016279][T20297] __should_failslab+0x92/0xa0 [ 229.021348][T20297] should_failslab+0x9/0x20 [ 229.025960][T20297] kmem_cache_alloc+0x4e/0x250 [ 229.030711][T20297] __kernfs_new_node+0x6a/0x380 [ 229.035560][T20297] ? rb_insert_color+0x6a/0x290 [ 229.040400][T20297] ? up_write+0x30/0xe0 [ 229.044629][T20297] ? kernfs_activate+0x252/0x270 [ 229.049704][T20297] kernfs_new_node+0x5f/0xd0 [ 229.054279][T20297] __kernfs_create_file+0x49/0x180 [ 229.059660][T20297] ? dev_attr_show+0x90/0x90 [ 229.064266][T20297] sysfs_add_file_mode_ns+0x136/0x1b0 [ 229.069632][T20297] internal_create_group+0x2e4/0x800 [ 229.075001][T20297] sysfs_create_groups+0x3c/0xe0 [ 229.080066][T20297] device_add_attrs+0x69/0x400 [ 229.084891][T20297] ? kobject_put+0xd8/0x160 [ 229.089559][T20297] device_add+0x431/0x8b0 [ 229.093949][T20297] netdev_register_kobject+0xfc/0x230 [ 229.099343][T20297] register_netdevice+0x86f/0xd60 [ 229.104468][T20297] ? validate_linkmsg+0x511/0x590 [ 229.109524][T20297] ipvlan_link_new+0x295/0x5c0 [ 229.114275][T20297] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 229.120042][T20297] rtnl_newlink+0xee5/0x1670 [ 229.124628][T20297] ? cgroup_rstat_updated+0x8c/0x1c0 [ 229.129979][T20297] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 229.136327][T20297] ? _raw_spin_unlock+0x26/0x40 [ 229.141162][T20297] ? __mutex_lock+0x21c/0x8d0 [ 229.145901][T20297] ? rtnl_setlink+0x300/0x300 [ 229.150977][T20297] rtnetlink_rcv_msg+0x807/0x8c0 [ 229.155900][T20297] ? memcg_list_lru_alloc+0xd5/0x750 [ 229.161285][T20297] ? mod_objcg_state+0x357/0x580 [ 229.166230][T20297] ? slab_post_alloc_hook+0x82/0x2f0 [ 229.171590][T20297] ? kmem_cache_free+0x1d9/0x380 [ 229.176540][T20297] ? __kfree_skb+0x104/0x140 [ 229.181163][T20297] ? nlmon_xmit+0x4b/0x60 [ 229.185522][T20297] ? __kfree_skb+0x104/0x140 [ 229.190132][T20297] ? consume_skb+0x57/0x180 [ 229.194677][T20297] ? nlmon_xmit+0x4b/0x60 [ 229.198990][T20297] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 229.204301][T20297] ? __dev_queue_xmit+0xaae/0x1d80 [ 229.209404][T20297] ? ref_tracker_free+0x3a1/0x400 [ 229.214546][T20297] netlink_rcv_skb+0x126/0x220 [ 229.219307][T20297] ? rtnetlink_bind+0x60/0x60 [ 229.224014][T20297] rtnetlink_rcv+0x1c/0x20 [ 229.228454][T20297] netlink_unicast+0x589/0x650 [ 229.233305][T20297] netlink_sendmsg+0x66e/0x770 [ 229.238309][T20297] ? netlink_getsockopt+0x3e0/0x3e0 [ 229.243582][T20297] ____sys_sendmsg+0x37c/0x4d0 [ 229.248419][T20297] __sys_sendmsg+0x1e9/0x270 [ 229.253037][T20297] __x64_sys_sendmsg+0x46/0x50 [ 229.257839][T20297] do_syscall_64+0x44/0x110 [ 229.262354][T20297] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 229.268288][T20297] RIP: 0033:0x7f4feb1a7ce9 [ 229.272698][T20297] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 229.292356][T20297] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 229.300752][T20297] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 229.308780][T20297] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 229.316809][T20297] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 14:27:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800011) 14:27:33 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 8) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:33 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2000, 0x0, 0x0, 0x600000}) 14:27:33 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 27) 14:27:33 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 229.324791][T20297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 229.332748][T20297] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 229.340719][T20297] [ 229.386285][T20311] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 229.397754][T20303] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 229.402375][T20315] FAULT_INJECTION: forcing a failure. [ 229.402375][T20315] name failslab, interval 1, probability 0, space 0, times 0 [ 229.420347][T20315] CPU: 1 PID: 20315 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 229.430828][T20315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 229.433091][T20307] FAULT_INJECTION: forcing a failure. [ 229.433091][T20307] name failslab, interval 1, probability 0, space 0, times 0 [ 229.440880][T20315] Call Trace: [ 229.440891][T20315] [ 229.440899][T20315] dump_stack_lvl+0xda/0x130 [ 229.440955][T20315] dump_stack+0x15/0x20 [ 229.468642][T20315] should_fail_ex+0x21f/0x230 [ 229.473346][T20315] ? __kernfs_new_node+0x6a/0x380 [ 229.478443][T20315] __should_failslab+0x92/0xa0 [ 229.483298][T20315] should_failslab+0x9/0x20 [ 229.487800][T20315] kmem_cache_alloc+0x4e/0x250 [ 229.492562][T20315] __kernfs_new_node+0x6a/0x380 [ 229.497420][T20315] ? rb_insert_color+0x263/0x290 [ 229.502357][T20315] ? up_write+0x30/0xe0 [ 229.506583][T20315] ? kernfs_activate+0x252/0x270 [ 229.511528][T20315] kernfs_new_node+0x5f/0xd0 [ 229.516247][T20315] __kernfs_create_file+0x49/0x180 [ 229.521353][T20315] ? dev_attr_show+0x90/0x90 [ 229.525968][T20315] sysfs_add_file_mode_ns+0x136/0x1b0 [ 229.531350][T20315] internal_create_group+0x2e4/0x800 [ 229.536760][T20315] sysfs_create_groups+0x3c/0xe0 [ 229.541768][T20315] device_add_attrs+0x69/0x400 [ 229.546680][T20315] ? kobject_put+0xd8/0x160 [ 229.551231][T20315] device_add+0x431/0x8b0 [ 229.555678][T20315] netdev_register_kobject+0xfc/0x230 [ 229.561088][T20315] register_netdevice+0x86f/0xd60 [ 229.566183][T20315] ? validate_linkmsg+0x511/0x590 [ 229.571210][T20315] ipvlan_link_new+0x295/0x5c0 [ 229.575964][T20315] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 229.581677][T20315] rtnl_newlink+0xee5/0x1670 [ 229.586267][T20315] ? security_capable+0x5e/0x80 [ 229.591109][T20315] ? ns_capable+0x7c/0xb0 [ 229.595459][T20315] ? rtnl_setlink+0x300/0x300 [ 229.600188][T20315] rtnetlink_rcv_msg+0x807/0x8c0 [ 229.605114][T20315] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 229.612277][T20315] ? selinux_inode_alloc_security+0xd4/0x120 [ 229.618351][T20315] ? kcsan_setup_watchpoint+0x3fe/0x410 [ 229.623892][T20315] ? kmem_cache_free+0x1d9/0x380 [ 229.628879][T20315] ? __kfree_skb+0x104/0x140 [ 229.633458][T20315] ? nlmon_xmit+0x4b/0x60 [ 229.637843][T20315] ? __kfree_skb+0x104/0x140 [ 229.642438][T20315] ? consume_skb+0x57/0x180 [ 229.647023][T20315] ? nlmon_xmit+0x4b/0x60 [ 229.651350][T20315] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 229.656769][T20315] ? __dev_queue_xmit+0xaae/0x1d80 [ 229.661876][T20315] ? ref_tracker_free+0x3a1/0x400 [ 229.666984][T20315] netlink_rcv_skb+0x126/0x220 [ 229.671783][T20315] ? rtnetlink_bind+0x60/0x60 [ 229.676472][T20315] rtnetlink_rcv+0x1c/0x20 [ 229.680881][T20315] netlink_unicast+0x589/0x650 [ 229.685687][T20315] netlink_sendmsg+0x66e/0x770 [ 229.690452][T20315] ? netlink_getsockopt+0x3e0/0x3e0 [ 229.695644][T20315] ____sys_sendmsg+0x37c/0x4d0 [ 229.700401][T20315] __sys_sendmsg+0x1e9/0x270 [ 229.704989][T20315] __x64_sys_sendmsg+0x46/0x50 [ 229.709745][T20315] do_syscall_64+0x44/0x110 [ 229.714306][T20315] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 229.720294][T20315] RIP: 0033:0x7f4feb1a7ce9 [ 229.724773][T20315] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 229.744467][T20315] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 229.752878][T20315] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 229.761024][T20315] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 229.769169][T20315] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 229.777192][T20315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 229.785156][T20315] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 229.793224][T20315] [ 229.796243][T20307] CPU: 0 PID: 20307 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 229.807170][T20307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 229.817274][T20307] Call Trace: [ 229.820560][T20307] [ 229.823565][T20307] dump_stack_lvl+0xda/0x130 [ 229.828182][T20307] dump_stack+0x15/0x20 [ 229.832413][T20307] should_fail_ex+0x21f/0x230 [ 229.832748][T20314] ipvlan15: entered promiscuous mode [ 229.837183][T20307] ? ext4_htree_store_dirent+0x5d/0x290 [ 229.837213][T20307] __should_failslab+0x92/0xa0 [ 229.846023][T20314] bridge0: port 2(ipvlan15) entered blocking state [ 229.848239][T20307] should_failslab+0x9/0x20 [ 229.848268][T20307] __kmem_cache_alloc_node+0x4e/0x210 [ 229.853114][T20314] bridge0: port 2(ipvlan15) entered disabled state [ 229.859590][T20307] ? ext4_htree_store_dirent+0x5d/0x290 [ 229.866322][T20314] ipvlan15: entered allmulticast mode 14:27:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/igmp\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/igmp\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) 14:27:34 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 28) 14:27:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800064) [ 229.869538][T20307] __kmalloc+0x95/0x1a0 [ 229.869565][T20307] ext4_htree_store_dirent+0x5d/0x290 [ 229.876054][T20314] bridge0: entered allmulticast mode [ 229.881660][T20307] htree_dirblock_to_tree+0x4c3/0x630 [ 229.888699][T20314] ipvlan15: left allmulticast mode [ 229.891195][T20307] ext4_htree_fill_tree+0x429/0x9b0 [ 229.896642][T20314] bridge0: left allmulticast mode [ 229.901935][T20307] ? _raw_spin_unlock+0x26/0x40 [ 229.927873][T20307] ? __find_get_block+0x5d2/0x890 [ 229.933047][T20307] ? slab_post_alloc_hook+0x82/0x2f0 [ 229.938383][T20307] ? ext4_readdir+0x2b3/0x1ac0 [ 229.943248][T20307] ext4_readdir+0x15b0/0x1ac0 [ 229.947914][T20307] ? down_read_killable+0x170/0x6b0 [ 229.953135][T20307] ? fsnotify_perm+0x360/0x380 [ 229.957958][T20307] iterate_dir+0x128/0x300 [ 229.962370][T20307] exportfs_get_name+0x230/0x2a0 [ 229.967312][T20307] ? exportfs_decode_fh+0x70/0x70 [ 229.972411][T20307] reconnect_path+0x158/0x3e0 [ 229.977083][T20307] exportfs_decode_fh_raw+0x184/0x400 [ 229.982490][T20307] ? do_handle_open+0x3d0/0x3d0 [ 229.987348][T20307] ? do_handle_open+0x3d0/0x3d0 [ 229.992221][T20307] exportfs_decode_fh+0x3c/0x70 [ 229.997106][T20307] do_handle_open+0x2df/0x3d0 [ 230.001799][T20307] __x64_sys_open_by_handle_at+0x46/0x50 [ 230.007458][T20307] do_syscall_64+0x44/0x110 [ 230.011954][T20307] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 230.017855][T20307] RIP: 0033:0x7fbc0d2a7ce9 [ 230.022353][T20307] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 230.042102][T20307] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 230.050578][T20307] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 230.058554][T20307] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 230.066550][T20307] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 230.074593][T20307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:27:34 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 9) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 230.082572][T20307] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 230.090531][T20307] [ 230.120207][T20320] FAULT_INJECTION: forcing a failure. [ 230.120207][T20320] name failslab, interval 1, probability 0, space 0, times 0 [ 230.133013][T20320] CPU: 1 PID: 20320 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 230.143434][T20320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 230.153482][T20320] Call Trace: [ 230.156878][T20320] [ 230.159799][T20320] dump_stack_lvl+0xda/0x130 [ 230.164465][T20320] dump_stack+0x15/0x20 [ 230.168698][T20320] should_fail_ex+0x21f/0x230 [ 230.173380][T20320] ? __kernfs_new_node+0x6a/0x380 [ 230.178426][T20320] __should_failslab+0x92/0xa0 [ 230.183221][T20320] should_failslab+0x9/0x20 [ 230.187720][T20320] kmem_cache_alloc+0x4e/0x250 [ 230.192555][T20320] __kernfs_new_node+0x6a/0x380 [ 230.197495][T20320] ? rb_insert_color+0x6a/0x290 [ 230.202440][T20320] ? up_write+0x30/0xe0 [ 230.206632][T20320] ? kernfs_activate+0x252/0x270 [ 230.211719][T20320] kernfs_new_node+0x5f/0xd0 [ 230.216301][T20320] __kernfs_create_file+0x49/0x180 [ 230.221412][T20320] ? dev_attr_show+0x90/0x90 [ 230.226079][T20320] sysfs_add_file_mode_ns+0x136/0x1b0 [ 230.231512][T20320] internal_create_group+0x2e4/0x800 [ 230.236865][T20320] sysfs_create_groups+0x3c/0xe0 [ 230.241855][T20320] device_add_attrs+0x69/0x400 [ 230.246739][T20320] ? kobject_put+0xd8/0x160 [ 230.251360][T20320] device_add+0x431/0x8b0 [ 230.255768][T20320] netdev_register_kobject+0xfc/0x230 [ 230.261154][T20320] register_netdevice+0x86f/0xd60 [ 230.266176][T20320] ? validate_linkmsg+0x511/0x590 [ 230.271287][T20320] ipvlan_link_new+0x295/0x5c0 [ 230.276218][T20320] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 230.281970][T20320] rtnl_newlink+0xee5/0x1670 [ 230.286567][T20320] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 230.292956][T20320] ? _raw_spin_unlock+0x26/0x40 [ 230.297951][T20320] ? __mutex_lock+0x21c/0x8d0 [ 230.302757][T20320] ? rtnl_setlink+0x300/0x300 [ 230.307482][T20320] rtnetlink_rcv_msg+0x807/0x8c0 [ 230.312419][T20320] ? memcg_list_lru_alloc+0xd5/0x750 [ 230.317707][T20320] ? mod_objcg_state+0x357/0x580 [ 230.322735][T20320] ? slab_post_alloc_hook+0x82/0x2f0 [ 230.328067][T20320] ? kmem_cache_free+0x1d9/0x380 [ 230.333023][T20320] ? __kfree_skb+0x104/0x140 [ 230.337714][T20320] ? nlmon_xmit+0x4b/0x60 [ 230.342039][T20320] ? __kfree_skb+0x104/0x140 [ 230.346719][T20320] ? consume_skb+0x57/0x180 [ 230.351212][T20320] ? nlmon_xmit+0x4b/0x60 [ 230.355597][T20320] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 230.360880][T20320] ? __dev_queue_xmit+0xaae/0x1d80 [ 230.366021][T20320] ? ref_tracker_free+0x3a1/0x400 [ 230.371039][T20320] netlink_rcv_skb+0x126/0x220 [ 230.375795][T20320] ? rtnetlink_bind+0x60/0x60 [ 230.380466][T20320] rtnetlink_rcv+0x1c/0x20 [ 230.384959][T20320] netlink_unicast+0x589/0x650 [ 230.389762][T20320] netlink_sendmsg+0x66e/0x770 [ 230.394518][T20320] ? netlink_getsockopt+0x3e0/0x3e0 [ 230.399706][T20320] ____sys_sendmsg+0x37c/0x4d0 [ 230.404494][T20320] __sys_sendmsg+0x1e9/0x270 [ 230.409082][T20320] __x64_sys_sendmsg+0x46/0x50 [ 230.413836][T20320] do_syscall_64+0x44/0x110 [ 230.418334][T20320] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 230.424221][T20320] RIP: 0033:0x7f4feb1a7ce9 [ 230.428721][T20320] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 230.448343][T20320] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 230.456747][T20320] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 14:27:34 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2001, 0x0, 0x0, 0x600000}) 14:27:34 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 29) 14:27:34 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 230.464711][T20320] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 230.472744][T20320] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 230.480854][T20320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 230.488825][T20320] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 230.496865][T20320] [ 230.500985][T20326] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 230.511283][T20327] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 230.547086][T20322] FAULT_INJECTION: forcing a failure. [ 230.547086][T20322] name failslab, interval 1, probability 0, space 0, times 0 [ 230.553340][T20334] FAULT_INJECTION: forcing a failure. [ 230.553340][T20334] name failslab, interval 1, probability 0, space 0, times 0 [ 230.559770][T20322] CPU: 0 PID: 20322 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 230.582917][T20322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 230.592978][T20322] Call Trace: [ 230.596256][T20322] [ 230.599310][T20322] dump_stack_lvl+0xda/0x130 [ 230.603904][T20322] dump_stack+0x15/0x20 [ 230.608382][T20322] should_fail_ex+0x21f/0x230 [ 230.613163][T20322] ? ext4_htree_store_dirent+0x5d/0x290 [ 230.618718][T20322] __should_failslab+0x92/0xa0 [ 230.623522][T20322] should_failslab+0x9/0x20 [ 230.628058][T20322] __kmem_cache_alloc_node+0x4e/0x210 [ 230.633430][T20322] ? ext4_htree_store_dirent+0x5d/0x290 [ 230.639069][T20322] __kmalloc+0x95/0x1a0 [ 230.643219][T20322] ext4_htree_store_dirent+0x5d/0x290 [ 230.648671][T20322] htree_dirblock_to_tree+0x4c3/0x630 [ 230.654137][T20322] ext4_htree_fill_tree+0x429/0x9b0 [ 230.659344][T20322] ? _raw_spin_unlock+0x26/0x40 [ 230.664284][T20322] ? __find_get_block+0x5d2/0x890 [ 230.669384][T20322] ? slab_post_alloc_hook+0x82/0x2f0 [ 230.674705][T20322] ? ext4_readdir+0x2b3/0x1ac0 [ 230.679766][T20322] ext4_readdir+0x15b0/0x1ac0 [ 230.684548][T20322] ? down_read_killable+0x170/0x6b0 [ 230.689753][T20322] ? fsnotify_perm+0x360/0x380 [ 230.694519][T20322] iterate_dir+0x128/0x300 [ 230.699018][T20322] exportfs_get_name+0x230/0x2a0 [ 230.703980][T20322] ? exportfs_decode_fh+0x70/0x70 [ 230.709001][T20322] reconnect_path+0x158/0x3e0 [ 230.713781][T20322] exportfs_decode_fh_raw+0x184/0x400 [ 230.719180][T20322] ? do_handle_open+0x3d0/0x3d0 [ 230.724163][T20322] ? do_handle_open+0x3d0/0x3d0 [ 230.729088][T20322] exportfs_decode_fh+0x3c/0x70 [ 230.733942][T20322] do_handle_open+0x2df/0x3d0 [ 230.738624][T20322] __x64_sys_open_by_handle_at+0x46/0x50 [ 230.744325][T20322] do_syscall_64+0x44/0x110 [ 230.748829][T20322] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 230.754849][T20322] RIP: 0033:0x7fbc0d2a7ce9 [ 230.759252][T20322] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 230.778875][T20322] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 230.787275][T20322] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 230.795236][T20322] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 230.803346][T20322] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 230.811312][T20322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.819273][T20322] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 230.827238][T20322] [ 230.830248][T20334] CPU: 1 PID: 20334 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:35 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 10) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0/file0/file0\x00', r0}, 0x18) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 230.840746][T20334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 230.850811][T20334] Call Trace: [ 230.854093][T20334] [ 230.857042][T20334] dump_stack_lvl+0xda/0x130 [ 230.861660][T20334] dump_stack+0x15/0x20 [ 230.865852][T20334] should_fail_ex+0x21f/0x230 [ 230.870617][T20334] ? __kernfs_new_node+0x6a/0x380 [ 230.875646][T20334] __should_failslab+0x92/0xa0 [ 230.880478][T20334] should_failslab+0x9/0x20 [ 230.885078][T20334] kmem_cache_alloc+0x4e/0x250 [ 230.888892][T20348] FAULT_INJECTION: forcing a failure. [ 230.888892][T20348] name failslab, interval 1, probability 0, space 0, times 0 [ 230.889875][T20334] __kernfs_new_node+0x6a/0x380 [ 230.889944][T20334] ? rb_insert_color+0x6a/0x290 [ 230.912198][T20334] ? up_write+0x30/0xe0 [ 230.916402][T20334] ? kernfs_activate+0x252/0x270 [ 230.921375][T20334] kernfs_new_node+0x5f/0xd0 [ 230.925955][T20334] __kernfs_create_file+0x49/0x180 [ 230.931243][T20334] ? dev_attr_show+0x90/0x90 [ 230.935896][T20334] sysfs_add_file_mode_ns+0x136/0x1b0 [ 230.941263][T20334] internal_create_group+0x2e4/0x800 [ 230.946669][T20334] sysfs_create_groups+0x3c/0xe0 [ 230.951606][T20334] device_add_attrs+0x69/0x400 [ 230.956416][T20334] ? kobject_put+0xd8/0x160 [ 230.960994][T20334] device_add+0x431/0x8b0 [ 230.965393][T20334] netdev_register_kobject+0xfc/0x230 [ 230.970813][T20334] register_netdevice+0x86f/0xd60 [ 230.975835][T20334] ? validate_linkmsg+0x511/0x590 [ 230.980931][T20334] ipvlan_link_new+0x295/0x5c0 [ 230.985772][T20334] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 230.991486][T20334] rtnl_newlink+0xee5/0x1670 [ 230.996147][T20334] ? security_capable+0x5e/0x80 [ 231.001039][T20334] ? ns_capable+0x7c/0xb0 [ 231.005377][T20334] ? rtnl_setlink+0x300/0x300 [ 231.010151][T20334] rtnetlink_rcv_msg+0x807/0x8c0 [ 231.015084][T20334] ? memcg_list_lru_alloc+0xd5/0x750 [ 231.020374][T20334] ? mod_objcg_state+0x357/0x580 [ 231.025305][T20334] ? slab_post_alloc_hook+0x82/0x2f0 [ 231.030610][T20334] ? kmem_cache_free+0x1d9/0x380 [ 231.035593][T20334] ? __kfree_skb+0x104/0x140 [ 231.040246][T20334] ? nlmon_xmit+0x4b/0x60 [ 231.044567][T20334] ? __kfree_skb+0x104/0x140 [ 231.049228][T20334] ? consume_skb+0x57/0x180 [ 231.053716][T20334] ? nlmon_xmit+0x4b/0x60 [ 231.058104][T20334] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 231.063461][T20334] ? __dev_queue_xmit+0xaae/0x1d80 [ 231.068567][T20334] ? ref_tracker_free+0x3a1/0x400 [ 231.073743][T20334] netlink_rcv_skb+0x126/0x220 [ 231.078499][T20334] ? rtnetlink_bind+0x60/0x60 [ 231.083167][T20334] rtnetlink_rcv+0x1c/0x20 [ 231.087648][T20334] netlink_unicast+0x589/0x650 [ 231.092490][T20334] netlink_sendmsg+0x66e/0x770 [ 231.097259][T20334] ? netlink_getsockopt+0x3e0/0x3e0 [ 231.102528][T20334] ____sys_sendmsg+0x37c/0x4d0 [ 231.108728][T20334] __sys_sendmsg+0x1e9/0x270 [ 231.113327][T20334] __x64_sys_sendmsg+0x46/0x50 [ 231.118081][T20334] do_syscall_64+0x44/0x110 [ 231.122580][T20334] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 231.128647][T20334] RIP: 0033:0x7f4feb1a7ce9 [ 231.133064][T20334] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 231.152755][T20334] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 231.161165][T20334] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 231.169138][T20334] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 231.177100][T20334] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 231.185062][T20334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.193079][T20334] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 231.201051][T20334] [ 231.204069][T20348] CPU: 0 PID: 20348 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 231.214563][T20348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 231.224725][T20348] Call Trace: [ 231.228007][T20348] [ 231.231018][T20348] dump_stack_lvl+0xda/0x130 [ 231.235639][T20348] dump_stack+0x15/0x20 [ 231.239807][T20348] should_fail_ex+0x21f/0x230 [ 231.240158][T20336] ipvlan15: entered promiscuous mode [ 231.244518][T20348] ? ext4_htree_store_dirent+0x5d/0x290 [ 231.252475][T20336] bridge0: port 2(ipvlan15) entered blocking state [ 231.255394][T20348] __should_failslab+0x92/0xa0 [ 231.255430][T20348] should_failslab+0x9/0x20 [ 231.261979][T20336] bridge0: port 2(ipvlan15) entered disabled state [ 231.266641][T20348] __kmem_cache_alloc_node+0x4e/0x210 [ 231.272856][T20336] ipvlan15: entered allmulticast mode [ 231.277621][T20348] ? ext4_htree_store_dirent+0x5d/0x290 [ 231.283005][T20336] bridge0: entered allmulticast mode 14:27:35 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 30) 14:27:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008000a6) [ 231.288339][T20348] __kmalloc+0x95/0x1a0 [ 231.295846][T20336] ipvlan15: left allmulticast mode [ 231.299201][T20348] ext4_htree_store_dirent+0x5d/0x290 [ 231.303528][T20336] bridge0: left allmulticast mode [ 231.308647][T20348] htree_dirblock_to_tree+0x4c3/0x630 [ 231.308680][T20348] ext4_htree_fill_tree+0x429/0x9b0 [ 231.330075][T20348] ? __find_get_block+0x663/0x890 [ 231.335143][T20348] ? slab_post_alloc_hook+0x82/0x2f0 [ 231.340561][T20348] ? ext4_readdir+0x2b3/0x1ac0 [ 231.345463][T20348] ext4_readdir+0x15b0/0x1ac0 [ 231.350141][T20348] ? down_read_killable+0x170/0x6b0 [ 231.355328][T20348] ? fsnotify_perm+0x360/0x380 [ 231.360154][T20348] iterate_dir+0x128/0x300 [ 231.364572][T20348] exportfs_get_name+0x230/0x2a0 [ 231.369492][T20348] ? exportfs_decode_fh+0x70/0x70 [ 231.374530][T20348] reconnect_path+0x158/0x3e0 [ 231.379209][T20348] exportfs_decode_fh_raw+0x184/0x400 [ 231.384626][T20348] ? do_handle_open+0x3d0/0x3d0 [ 231.389500][T20348] ? do_handle_open+0x3d0/0x3d0 [ 231.394423][T20348] exportfs_decode_fh+0x3c/0x70 [ 231.399303][T20348] do_handle_open+0x2df/0x3d0 [ 231.404000][T20348] __x64_sys_open_by_handle_at+0x46/0x50 [ 231.409666][T20348] do_syscall_64+0x44/0x110 [ 231.414158][T20348] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 231.420036][T20348] RIP: 0033:0x7fbc0d2a7ce9 [ 231.424431][T20348] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:35 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 11) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 231.444036][T20348] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 231.452440][T20348] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 231.460616][T20348] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 231.468618][T20348] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 231.476651][T20348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.484605][T20348] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 231.492631][T20348] [ 231.516697][T20355] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 231.531042][T20353] FAULT_INJECTION: forcing a failure. [ 231.531042][T20353] name failslab, interval 1, probability 0, space 0, times 0 [ 231.543690][T20353] CPU: 1 PID: 20353 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 231.550104][T20360] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:35 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2100, 0x0, 0x0, 0x600000}) [ 231.554100][T20353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 231.554114][T20353] Call Trace: [ 231.554120][T20353] [ 231.580312][T20353] dump_stack_lvl+0xda/0x130 [ 231.584928][T20353] dump_stack+0x15/0x20 [ 231.589124][T20353] should_fail_ex+0x21f/0x230 [ 231.593944][T20353] ? __kernfs_new_node+0x6a/0x380 [ 231.595179][T20357] FAULT_INJECTION: forcing a failure. [ 231.595179][T20357] name failslab, interval 1, probability 0, space 0, times 0 [ 231.598963][T20353] __should_failslab+0x92/0xa0 [ 231.598996][T20353] should_failslab+0x9/0x20 [ 231.599019][T20353] kmem_cache_alloc+0x4e/0x250 [ 231.625595][T20353] __kernfs_new_node+0x6a/0x380 [ 231.630525][T20353] ? rb_insert_color+0x6a/0x290 [ 231.635373][T20353] ? up_write+0x30/0xe0 [ 231.639518][T20353] ? kernfs_activate+0x252/0x270 [ 231.644490][T20353] kernfs_new_node+0x5f/0xd0 [ 231.649091][T20353] __kernfs_create_file+0x49/0x180 [ 231.654264][T20353] ? dev_attr_show+0x90/0x90 [ 231.658853][T20353] sysfs_add_file_mode_ns+0x136/0x1b0 [ 231.664239][T20353] internal_create_group+0x2e4/0x800 [ 231.669576][T20353] sysfs_create_groups+0x3c/0xe0 [ 231.674562][T20353] device_add_attrs+0x69/0x400 [ 231.679388][T20353] ? kobject_put+0xd8/0x160 [ 231.683886][T20353] device_add+0x431/0x8b0 [ 231.688287][T20353] netdev_register_kobject+0xfc/0x230 [ 231.693730][T20353] register_netdevice+0x86f/0xd60 [ 231.698835][T20353] ? validate_linkmsg+0x511/0x590 [ 231.703947][T20353] ipvlan_link_new+0x295/0x5c0 [ 231.708704][T20353] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 231.714471][T20353] rtnl_newlink+0xee5/0x1670 [ 231.719081][T20353] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 231.725341][T20353] ? _raw_spin_unlock+0x26/0x40 [ 231.730281][T20353] ? __mutex_lock+0x21c/0x8d0 [ 231.735033][T20353] ? rtnl_setlink+0x300/0x300 [ 231.739724][T20353] rtnetlink_rcv_msg+0x807/0x8c0 [ 231.744729][T20353] ? memcg_list_lru_alloc+0xd5/0x750 [ 231.750069][T20353] ? mod_objcg_state+0x357/0x580 [ 231.755000][T20353] ? slab_post_alloc_hook+0x82/0x2f0 [ 231.760346][T20353] ? kmem_cache_free+0x1d9/0x380 [ 231.765277][T20353] ? __kfree_skb+0x104/0x140 [ 231.769864][T20353] ? nlmon_xmit+0x4b/0x60 [ 231.774261][T20353] ? __kfree_skb+0x104/0x140 [ 231.778842][T20353] ? consume_skb+0x57/0x180 [ 231.783330][T20353] ? nlmon_xmit+0x4b/0x60 [ 231.787655][T20353] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 231.793094][T20353] ? __dev_queue_xmit+0xaae/0x1d80 [ 231.798202][T20353] ? ref_tracker_free+0x3a1/0x400 [ 231.803219][T20353] netlink_rcv_skb+0x126/0x220 [ 231.807974][T20353] ? rtnetlink_bind+0x60/0x60 [ 231.812647][T20353] rtnetlink_rcv+0x1c/0x20 [ 231.817064][T20353] netlink_unicast+0x589/0x650 [ 231.821893][T20353] netlink_sendmsg+0x66e/0x770 [ 231.826705][T20353] ? netlink_getsockopt+0x3e0/0x3e0 [ 231.831894][T20353] ____sys_sendmsg+0x37c/0x4d0 [ 231.836657][T20353] __sys_sendmsg+0x1e9/0x270 [ 231.841359][T20353] __x64_sys_sendmsg+0x46/0x50 [ 231.846262][T20353] do_syscall_64+0x44/0x110 [ 231.850801][T20353] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 231.856711][T20353] RIP: 0033:0x7f4feb1a7ce9 [ 231.861149][T20353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 231.880764][T20353] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 231.889330][T20353] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 231.897368][T20353] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 231.905411][T20353] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 231.913417][T20353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.921458][T20353] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 231.929510][T20353] [ 231.932517][T20357] CPU: 0 PID: 20357 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 231.942946][T20357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 231.953014][T20357] Call Trace: [ 231.956298][T20357] [ 231.959294][T20357] dump_stack_lvl+0xda/0x130 [ 231.963909][T20357] dump_stack+0x15/0x20 [ 231.968097][T20357] should_fail_ex+0x21f/0x230 [ 231.972788][T20357] ? ext4_htree_store_dirent+0x5d/0x290 [ 231.978344][T20357] __should_failslab+0x92/0xa0 [ 231.983123][T20357] should_failslab+0x9/0x20 [ 231.987648][T20357] __kmem_cache_alloc_node+0x4e/0x210 [ 231.994251][T20357] ? ext4_htree_store_dirent+0x5d/0x290 [ 231.999943][T20357] __kmalloc+0x95/0x1a0 [ 232.004127][T20357] ext4_htree_store_dirent+0x5d/0x290 [ 232.009632][T20357] htree_dirblock_to_tree+0x4c3/0x630 [ 232.015022][T20357] ext4_htree_fill_tree+0x429/0x9b0 [ 232.015965][T20367] FAULT_INJECTION: forcing a failure. [ 232.015965][T20367] name failslab, interval 1, probability 0, space 0, times 0 [ 232.020319][T20357] ? _raw_spin_unlock+0x26/0x40 [ 232.020342][T20357] ? __find_get_block+0x5d2/0x890 [ 232.042755][T20357] ? slab_post_alloc_hook+0x82/0x2f0 [ 232.048042][T20357] ? ext4_readdir+0x2b3/0x1ac0 [ 232.052798][T20357] ext4_readdir+0x15b0/0x1ac0 [ 232.057506][T20357] ? down_read_killable+0x170/0x6b0 [ 232.062783][T20357] ? fsnotify_perm+0x360/0x380 [ 232.067576][T20357] iterate_dir+0x128/0x300 [ 232.071987][T20357] exportfs_get_name+0x230/0x2a0 [ 232.077030][T20357] ? exportfs_decode_fh+0x70/0x70 [ 232.082047][T20357] reconnect_path+0x158/0x3e0 [ 232.086727][T20357] exportfs_decode_fh_raw+0x184/0x400 [ 232.092147][T20357] ? do_handle_open+0x3d0/0x3d0 [ 232.097060][T20357] ? do_handle_open+0x3d0/0x3d0 [ 232.101973][T20357] exportfs_decode_fh+0x3c/0x70 [ 232.106845][T20357] do_handle_open+0x2df/0x3d0 [ 232.111517][T20357] __x64_sys_open_by_handle_at+0x46/0x50 [ 232.117213][T20357] do_syscall_64+0x44/0x110 [ 232.121854][T20357] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 232.127738][T20357] RIP: 0033:0x7fbc0d2a7ce9 [ 232.132159][T20357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 232.151761][T20357] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 232.160235][T20357] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 14:27:36 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 31) 14:27:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2101, 0x0, 0x0, 0x600000}) 14:27:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008000a8) 14:27:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0/file0/file0\x00', r0}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0/file0/file0\x00', r0}, 0x18) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 232.168192][T20357] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 232.176154][T20357] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 232.184113][T20357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 232.192110][T20357] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 232.200121][T20357] [ 232.203129][T20367] CPU: 1 PID: 20367 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:36 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 12) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 232.213554][T20367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 232.223714][T20367] Call Trace: [ 232.227028][T20367] [ 232.229976][T20367] dump_stack_lvl+0xda/0x130 [ 232.234616][T20367] dump_stack+0x15/0x20 [ 232.238785][T20367] should_fail_ex+0x21f/0x230 [ 232.243477][T20367] ? __kernfs_new_node+0x6a/0x380 [ 232.248520][T20367] __should_failslab+0x92/0xa0 [ 232.253296][T20367] should_failslab+0x9/0x20 [ 232.257809][T20367] kmem_cache_alloc+0x4e/0x250 [ 232.262659][T20367] __kernfs_new_node+0x6a/0x380 [ 232.265637][T20370] FAULT_INJECTION: forcing a failure. [ 232.265637][T20370] name failslab, interval 1, probability 0, space 0, times 0 [ 232.267578][T20367] ? rb_insert_color+0x263/0x290 [ 232.285513][T20367] ? up_write+0x30/0xe0 [ 232.289662][T20367] ? kernfs_activate+0x252/0x270 [ 232.294737][T20367] kernfs_new_node+0x5f/0xd0 [ 232.299345][T20367] __kernfs_create_file+0x49/0x180 [ 232.304484][T20367] ? dev_attr_show+0x90/0x90 [ 232.309065][T20367] sysfs_add_file_mode_ns+0x136/0x1b0 [ 232.314534][T20367] internal_create_group+0x2e4/0x800 [ 232.319817][T20367] sysfs_create_groups+0x3c/0xe0 [ 232.324801][T20367] device_add_attrs+0x69/0x400 [ 232.329563][T20367] ? kobject_put+0xd8/0x160 [ 232.334060][T20367] device_add+0x431/0x8b0 [ 232.338381][T20367] netdev_register_kobject+0xfc/0x230 [ 232.343786][T20367] register_netdevice+0x86f/0xd60 [ 232.348897][T20367] ? validate_linkmsg+0x511/0x590 [ 232.354009][T20367] ipvlan_link_new+0x295/0x5c0 [ 232.358772][T20367] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 232.364494][T20367] rtnl_newlink+0xee5/0x1670 [ 232.369187][T20367] ? security_capable+0x5e/0x80 [ 232.374128][T20367] ? ns_capable+0x7c/0xb0 [ 232.378473][T20367] ? rtnl_setlink+0x300/0x300 [ 232.383158][T20367] rtnetlink_rcv_msg+0x807/0x8c0 [ 232.388104][T20367] ? memcg_list_lru_alloc+0xd5/0x750 [ 232.393395][T20367] ? mod_objcg_state+0x357/0x580 [ 232.398407][T20367] ? slab_post_alloc_hook+0x82/0x2f0 [ 232.403737][T20367] ? kmem_cache_free+0x1d9/0x380 [ 232.408748][T20367] ? __kfree_skb+0x104/0x140 [ 232.413329][T20367] ? nlmon_xmit+0x4b/0x60 [ 232.417647][T20367] ? __kfree_skb+0x104/0x140 [ 232.422225][T20367] ? consume_skb+0x57/0x180 [ 232.426717][T20367] ? nlmon_xmit+0x4b/0x60 [ 232.431106][T20367] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 232.436457][T20367] ? __dev_queue_xmit+0xaae/0x1d80 [ 232.441695][T20367] ? ref_tracker_free+0x3a1/0x400 [ 232.446725][T20367] ? __skb_clone+0x1ec/0x2f0 [ 232.451313][T20367] netlink_rcv_skb+0x126/0x220 [ 232.456070][T20367] ? rtnetlink_bind+0x60/0x60 [ 232.460776][T20367] rtnetlink_rcv+0x1c/0x20 [ 232.465180][T20367] netlink_unicast+0x589/0x650 [ 232.469956][T20367] netlink_sendmsg+0x66e/0x770 [ 232.474736][T20367] ? netlink_getsockopt+0x3e0/0x3e0 [ 232.479922][T20367] ____sys_sendmsg+0x37c/0x4d0 [ 232.484813][T20367] __sys_sendmsg+0x1e9/0x270 [ 232.489432][T20367] __x64_sys_sendmsg+0x46/0x50 [ 232.494252][T20367] do_syscall_64+0x44/0x110 [ 232.498769][T20367] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 232.504655][T20367] RIP: 0033:0x7f4feb1a7ce9 [ 232.509074][T20367] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 232.528677][T20367] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 232.537277][T20367] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 232.545248][T20367] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 232.553213][T20367] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 232.561172][T20367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:36 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:36 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 32) 14:27:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2200, 0x0, 0x0, 0x600000}) [ 232.569131][T20367] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 232.577097][T20367] [ 232.580103][T20370] CPU: 0 PID: 20370 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 232.590577][T20370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 232.600644][T20370] Call Trace: [ 232.603934][T20370] [ 232.606871][T20370] dump_stack_lvl+0xda/0x130 [ 232.611558][T20370] dump_stack+0x15/0x20 [ 232.615803][T20370] should_fail_ex+0x21f/0x230 14:27:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2201, 0x0, 0x0, 0x600000}) [ 232.620502][T20370] ? ext4_htree_store_dirent+0x5d/0x290 [ 232.626071][T20370] __should_failslab+0x92/0xa0 [ 232.630912][T20370] should_failslab+0x9/0x20 [ 232.635443][T20370] __kmem_cache_alloc_node+0x4e/0x210 [ 232.640842][T20370] ? ext4_htree_store_dirent+0x5d/0x290 [ 232.646403][T20370] __kmalloc+0x95/0x1a0 [ 232.650609][T20370] ext4_htree_store_dirent+0x5d/0x290 [ 232.656000][T20370] htree_dirblock_to_tree+0x4c3/0x630 [ 232.661393][T20370] ext4_htree_fill_tree+0x429/0x9b0 [ 232.666662][T20370] ? __find_get_block+0x663/0x890 14:27:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2300, 0x0, 0x0, 0x600000}) [ 232.671767][T20370] ? slab_post_alloc_hook+0x82/0x2f0 [ 232.677240][T20370] ? ext4_readdir+0x2b3/0x1ac0 [ 232.682020][T20370] ext4_readdir+0x15b0/0x1ac0 [ 232.686720][T20370] ? down_read_killable+0x170/0x6b0 [ 232.691946][T20370] ? fsnotify_perm+0x360/0x380 [ 232.696723][T20370] iterate_dir+0x128/0x300 [ 232.701203][T20370] exportfs_get_name+0x230/0x2a0 [ 232.705336][T20383] FAULT_INJECTION: forcing a failure. [ 232.705336][T20383] name failslab, interval 1, probability 0, space 0, times 0 [ 232.706190][T20370] ? exportfs_decode_fh+0x70/0x70 [ 232.723788][T20370] reconnect_path+0x158/0x3e0 [ 232.728544][T20370] exportfs_decode_fh_raw+0x184/0x400 [ 232.734007][T20370] ? do_handle_open+0x3d0/0x3d0 [ 232.738912][T20370] ? do_handle_open+0x3d0/0x3d0 [ 232.743900][T20370] exportfs_decode_fh+0x3c/0x70 [ 232.748742][T20370] do_handle_open+0x2df/0x3d0 [ 232.753473][T20370] __x64_sys_open_by_handle_at+0x46/0x50 [ 232.759101][T20370] do_syscall_64+0x44/0x110 [ 232.763620][T20370] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 232.769509][T20370] RIP: 0033:0x7fbc0d2a7ce9 [ 232.773913][T20370] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 232.793562][T20370] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 232.801989][T20370] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 232.810007][T20370] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 232.818008][T20370] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 232.825971][T20370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 232.833946][T20370] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 232.841920][T20370] [ 232.844930][T20383] CPU: 1 PID: 20383 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 232.855356][T20383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 232.865483][T20383] Call Trace: [ 232.868770][T20383] 14:27:37 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 13) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 232.871786][T20383] dump_stack_lvl+0xda/0x130 [ 232.876395][T20383] dump_stack+0x15/0x20 [ 232.880571][T20383] should_fail_ex+0x21f/0x230 [ 232.885271][T20383] ? __kernfs_new_node+0x6a/0x380 [ 232.890311][T20383] __should_failslab+0x92/0xa0 [ 232.895207][T20383] should_failslab+0x9/0x20 [ 232.899759][T20383] kmem_cache_alloc+0x4e/0x250 [ 232.904545][T20383] __kernfs_new_node+0x6a/0x380 [ 232.909410][T20383] ? rb_insert_color+0x263/0x290 [ 232.909813][T20386] FAULT_INJECTION: forcing a failure. [ 232.909813][T20386] name failslab, interval 1, probability 0, space 0, times 0 [ 232.914430][T20383] ? up_write+0x30/0xe0 [ 232.914452][T20383] ? kernfs_activate+0x252/0x270 [ 232.936099][T20383] kernfs_new_node+0x5f/0xd0 [ 232.940689][T20383] __kernfs_create_file+0x49/0x180 [ 232.945828][T20383] ? dev_attr_show+0x90/0x90 [ 232.950424][T20383] sysfs_add_file_mode_ns+0x136/0x1b0 [ 232.955913][T20383] internal_create_group+0x2e4/0x800 [ 232.961280][T20383] sysfs_create_groups+0x3c/0xe0 [ 232.966234][T20383] device_add_attrs+0x69/0x400 [ 232.970994][T20383] ? kobject_put+0xd8/0x160 [ 232.975572][T20383] device_add+0x431/0x8b0 [ 232.979969][T20383] netdev_register_kobject+0xfc/0x230 [ 232.985343][T20383] register_netdevice+0x86f/0xd60 [ 232.990381][T20383] ? validate_linkmsg+0x511/0x590 [ 232.995409][T20383] ipvlan_link_new+0x295/0x5c0 [ 233.000241][T20383] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 233.006079][T20383] rtnl_newlink+0xee5/0x1670 [ 233.010753][T20383] ? security_capable+0x5e/0x80 [ 233.015636][T20383] ? ns_capable+0x7c/0xb0 [ 233.019967][T20383] ? rtnl_setlink+0x300/0x300 [ 233.024642][T20383] rtnetlink_rcv_msg+0x807/0x8c0 [ 233.029572][T20383] ? memcg_list_lru_alloc+0xd5/0x750 [ 233.034900][T20383] ? mod_objcg_state+0x357/0x580 [ 233.039923][T20383] ? slab_post_alloc_hook+0x82/0x2f0 [ 233.045295][T20383] ? kmem_cache_free+0x1d9/0x380 [ 233.050224][T20383] ? __kfree_skb+0x104/0x140 [ 233.054803][T20383] ? nlmon_xmit+0x4b/0x60 [ 233.059125][T20383] ? __kfree_skb+0x104/0x140 [ 233.063751][T20383] ? consume_skb+0x57/0x180 [ 233.068243][T20383] ? nlmon_xmit+0x4b/0x60 [ 233.072562][T20383] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 233.077885][T20383] ? __dev_queue_xmit+0xaae/0x1d80 [ 233.082987][T20383] ? ref_tracker_free+0x3a1/0x400 [ 233.088001][T20383] netlink_rcv_skb+0x126/0x220 [ 233.092755][T20383] ? rtnetlink_bind+0x60/0x60 [ 233.097426][T20383] rtnetlink_rcv+0x1c/0x20 [ 233.101901][T20383] netlink_unicast+0x589/0x650 [ 233.106781][T20383] netlink_sendmsg+0x66e/0x770 [ 233.111552][T20383] ? netlink_getsockopt+0x3e0/0x3e0 [ 233.116749][T20383] ____sys_sendmsg+0x37c/0x4d0 [ 233.121522][T20383] __sys_sendmsg+0x1e9/0x270 [ 233.126120][T20383] __x64_sys_sendmsg+0x46/0x50 [ 233.130981][T20383] do_syscall_64+0x44/0x110 [ 233.135588][T20383] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 233.141542][T20383] RIP: 0033:0x7f4feb1a7ce9 [ 233.146029][T20383] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 233.165647][T20383] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.174053][T20383] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 233.182038][T20383] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 233.190001][T20383] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 233.198054][T20383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.206015][T20383] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 233.213980][T20383] [ 233.217363][T20386] CPU: 0 PID: 20386 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 233.227796][T20386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 233.239501][T20386] Call Trace: [ 233.242792][T20386] [ 233.245723][T20386] dump_stack_lvl+0xda/0x130 [ 233.250149][T20378] ipvlan15: entered promiscuous mode [ 233.250332][T20386] dump_stack+0x15/0x20 [ 233.257523][T20378] bridge0: port 2(ipvlan15) entered blocking state [ 233.259745][T20386] should_fail_ex+0x21f/0x230 14:27:37 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 33) [ 233.266309][T20378] bridge0: port 2(ipvlan15) entered disabled state [ 233.270925][T20386] ? ext4_htree_store_dirent+0x5d/0x290 [ 233.270953][T20386] __should_failslab+0x92/0xa0 [ 233.270985][T20386] should_failslab+0x9/0x20 [ 233.279241][T20378] ipvlan15: entered allmulticast mode [ 233.283034][T20386] __kmem_cache_alloc_node+0x4e/0x210 [ 233.287810][T20378] bridge0: entered allmulticast mode [ 233.289868][T20378] ipvlan15: left allmulticast mode [ 233.292400][T20386] ? ext4_htree_store_dirent+0x5d/0x290 [ 233.297769][T20378] bridge0: left allmulticast mode [ 233.303122][T20386] __kmalloc+0x95/0x1a0 [ 233.328497][T20386] ext4_htree_store_dirent+0x5d/0x290 [ 233.333903][T20386] htree_dirblock_to_tree+0x4c3/0x630 [ 233.339367][T20386] ext4_htree_fill_tree+0x429/0x9b0 [ 233.344567][T20386] ? __find_get_block+0x663/0x890 [ 233.349658][T20386] ? slab_post_alloc_hook+0x82/0x2f0 [ 233.355013][T20386] ? ext4_readdir+0x2b3/0x1ac0 [ 233.359768][T20386] ext4_readdir+0x15b0/0x1ac0 [ 233.364433][T20386] ? down_read_killable+0x170/0x6b0 [ 233.369700][T20386] ? fsnotify_perm+0x360/0x380 [ 233.374474][T20386] iterate_dir+0x128/0x300 [ 233.378903][T20386] exportfs_get_name+0x230/0x2a0 [ 233.383910][T20386] ? exportfs_decode_fh+0x70/0x70 [ 233.388963][T20386] reconnect_path+0x158/0x3e0 [ 233.393765][T20386] exportfs_decode_fh_raw+0x184/0x400 [ 233.399232][T20386] ? do_handle_open+0x3d0/0x3d0 [ 233.404112][T20386] ? do_handle_open+0x3d0/0x3d0 [ 233.409047][T20386] exportfs_decode_fh+0x3c/0x70 [ 233.413910][T20386] do_handle_open+0x2df/0x3d0 [ 233.418685][T20386] __x64_sys_open_by_handle_at+0x46/0x50 [ 233.424342][T20386] do_syscall_64+0x44/0x110 [ 233.428871][T20386] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 233.434773][T20386] RIP: 0033:0x7fbc0d2a7ce9 [ 233.439183][T20386] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 233.458789][T20386] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 233.467192][T20386] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 14:27:37 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 14) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 233.475156][T20386] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 233.483250][T20386] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 233.491203][T20386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.499235][T20386] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 233.507553][T20386] 14:27:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008000aa) [ 233.531359][T20390] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 233.542870][T20397] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 233.553765][T20394] FAULT_INJECTION: forcing a failure. [ 233.553765][T20394] name failslab, interval 1, probability 0, space 0, times 0 [ 233.566639][T20394] CPU: 1 PID: 20394 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2301, 0x0, 0x0, 0x600000}) [ 233.577175][T20394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 233.587244][T20394] Call Trace: [ 233.590529][T20394] [ 233.593468][T20394] dump_stack_lvl+0xda/0x130 [ 233.598142][T20394] dump_stack+0x15/0x20 [ 233.598387][T20402] FAULT_INJECTION: forcing a failure. [ 233.598387][T20402] name failslab, interval 1, probability 0, space 0, times 0 [ 233.602368][T20394] should_fail_ex+0x21f/0x230 [ 233.602402][T20394] ? __kernfs_new_node+0x6a/0x380 [ 233.626036][T20394] __should_failslab+0x92/0xa0 [ 233.630890][T20394] should_failslab+0x9/0x20 [ 233.635387][T20394] kmem_cache_alloc+0x4e/0x250 [ 233.640198][T20394] __kernfs_new_node+0x6a/0x380 [ 233.645081][T20394] ? rb_insert_color+0x263/0x290 [ 233.650012][T20394] ? up_write+0x30/0xe0 [ 233.654253][T20394] ? kernfs_activate+0x252/0x270 [ 233.659225][T20394] kernfs_new_node+0x5f/0xd0 [ 233.663805][T20394] __kernfs_create_file+0x49/0x180 [ 233.668999][T20394] ? dev_attr_show+0x90/0x90 [ 233.673582][T20394] sysfs_add_file_mode_ns+0x136/0x1b0 [ 233.678996][T20394] internal_create_group+0x2e4/0x800 [ 233.684414][T20394] sysfs_create_groups+0x3c/0xe0 [ 233.689355][T20394] device_add_attrs+0x69/0x400 [ 233.694191][T20394] ? kobject_put+0xd8/0x160 [ 233.698688][T20394] device_add+0x431/0x8b0 [ 233.703018][T20394] netdev_register_kobject+0xfc/0x230 [ 233.708400][T20394] register_netdevice+0x86f/0xd60 [ 233.713479][T20394] ? validate_linkmsg+0x511/0x590 [ 233.718604][T20394] ipvlan_link_new+0x295/0x5c0 [ 233.723471][T20394] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 233.729201][T20394] rtnl_newlink+0xee5/0x1670 [ 233.733825][T20394] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 233.740164][T20394] ? _raw_spin_unlock+0x26/0x40 [ 233.745008][T20394] ? __mutex_lock+0x21c/0x8d0 [ 233.749691][T20394] ? rtnl_setlink+0x300/0x300 [ 233.754403][T20394] rtnetlink_rcv_msg+0x807/0x8c0 [ 233.759623][T20394] ? memcg_list_lru_alloc+0xd5/0x750 [ 233.764907][T20394] ? mod_objcg_state+0x357/0x580 [ 233.769841][T20394] ? slab_post_alloc_hook+0x82/0x2f0 [ 233.775175][T20394] ? kmem_cache_free+0x1d9/0x380 [ 233.780107][T20394] ? __kfree_skb+0x104/0x140 [ 233.784715][T20394] ? nlmon_xmit+0x4b/0x60 [ 233.789229][T20394] ? __kfree_skb+0x104/0x140 [ 233.793817][T20394] ? consume_skb+0x57/0x180 [ 233.798350][T20394] ? nlmon_xmit+0x4b/0x60 [ 233.802688][T20394] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 233.808012][T20394] ? __dev_queue_xmit+0xaae/0x1d80 [ 233.813128][T20394] ? ref_tracker_free+0x3a1/0x400 [ 233.818227][T20394] netlink_rcv_skb+0x126/0x220 [ 233.823221][T20394] ? rtnetlink_bind+0x60/0x60 [ 233.827983][T20394] rtnetlink_rcv+0x1c/0x20 [ 233.832389][T20394] netlink_unicast+0x589/0x650 [ 233.837233][T20394] netlink_sendmsg+0x66e/0x770 [ 233.841987][T20394] ? netlink_getsockopt+0x3e0/0x3e0 [ 233.847221][T20394] ____sys_sendmsg+0x37c/0x4d0 [ 233.851978][T20394] __sys_sendmsg+0x1e9/0x270 [ 233.856564][T20394] __x64_sys_sendmsg+0x46/0x50 [ 233.861387][T20394] do_syscall_64+0x44/0x110 [ 233.865940][T20394] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 233.871859][T20394] RIP: 0033:0x7f4feb1a7ce9 [ 233.876264][T20394] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 233.895901][T20394] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.904305][T20394] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 233.912346][T20394] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 233.920315][T20394] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 233.928431][T20394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.936396][T20394] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 233.944452][T20394] [ 233.947499][T20402] CPU: 0 PID: 20402 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 233.958024][T20402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 233.968093][T20402] Call Trace: [ 233.971383][T20402] [ 233.974372][T20402] dump_stack_lvl+0xda/0x130 [ 233.978983][T20402] dump_stack+0x15/0x20 [ 233.983259][T20402] should_fail_ex+0x21f/0x230 [ 233.987959][T20402] ? ext4_htree_store_dirent+0x5d/0x290 [ 233.993524][T20402] __should_failslab+0x92/0xa0 [ 233.998380][T20402] should_failslab+0x9/0x20 [ 234.000417][T20409] FAULT_INJECTION: forcing a failure. [ 234.000417][T20409] name failslab, interval 1, probability 0, space 0, times 0 [ 234.002947][T20402] __kmem_cache_alloc_node+0x4e/0x210 [ 234.020899][T20402] ? ext4_htree_store_dirent+0x5d/0x290 [ 234.026545][T20402] __kmalloc+0x95/0x1a0 [ 234.032032][T20402] ext4_htree_store_dirent+0x5d/0x290 [ 234.037562][T20402] htree_dirblock_to_tree+0x4c3/0x630 [ 234.042943][T20402] ext4_htree_fill_tree+0x429/0x9b0 [ 234.048233][T20402] ? _raw_spin_unlock+0x26/0x40 [ 234.053083][T20402] ? __find_get_block+0x5d2/0x890 [ 234.058159][T20402] ? slab_post_alloc_hook+0x82/0x2f0 [ 234.063718][T20402] ? ext4_readdir+0x2b3/0x1ac0 [ 234.068481][T20402] ext4_readdir+0x15b0/0x1ac0 [ 234.073207][T20402] ? down_read_killable+0x170/0x6b0 [ 234.078404][T20402] ? fsnotify_perm+0x360/0x380 [ 234.083201][T20402] iterate_dir+0x128/0x300 [ 234.087657][T20402] exportfs_get_name+0x230/0x2a0 [ 234.092589][T20402] ? exportfs_decode_fh+0x70/0x70 [ 234.097606][T20402] reconnect_path+0x158/0x3e0 [ 234.102361][T20402] exportfs_decode_fh_raw+0x184/0x400 [ 234.107753][T20402] ? do_handle_open+0x3d0/0x3d0 [ 234.112708][T20402] ? do_handle_open+0x3d0/0x3d0 [ 234.117565][T20402] exportfs_decode_fh+0x3c/0x70 [ 234.122479][T20402] do_handle_open+0x2df/0x3d0 [ 234.127298][T20402] __x64_sys_open_by_handle_at+0x46/0x50 [ 234.132929][T20402] do_syscall_64+0x44/0x110 [ 234.137437][T20402] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 234.143323][T20402] RIP: 0033:0x7fbc0d2a7ce9 [ 234.147740][T20402] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 234.167339][T20402] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 234.175739][T20402] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 14:27:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0/file0/file0\x00', r0}, 0x18) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:38 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 34) 14:27:38 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2400, 0x0, 0x0, 0x600000}) [ 234.183699][T20402] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 234.191727][T20402] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 234.199688][T20402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.207660][T20402] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 234.215656][T20402] [ 234.218688][T20409] CPU: 1 PID: 20409 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:38 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 15) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 234.229118][T20409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 234.239202][T20409] Call Trace: [ 234.242493][T20409] [ 234.245425][T20409] dump_stack_lvl+0xda/0x130 [ 234.250177][T20409] dump_stack+0x15/0x20 [ 234.254392][T20409] should_fail_ex+0x21f/0x230 [ 234.259176][T20409] ? __kernfs_new_node+0x6a/0x380 [ 234.264207][T20409] __should_failslab+0x92/0xa0 [ 234.269012][T20409] should_failslab+0x9/0x20 [ 234.272058][T20413] FAULT_INJECTION: forcing a failure. [ 234.272058][T20413] name failslab, interval 1, probability 0, space 0, times 0 [ 234.273513][T20409] kmem_cache_alloc+0x4e/0x250 [ 234.290861][T20409] __kernfs_new_node+0x6a/0x380 [ 234.295792][T20409] ? rb_insert_color+0x280/0x290 [ 234.300786][T20409] ? up_write+0x30/0xe0 [ 234.305392][T20409] ? kernfs_activate+0x252/0x270 [ 234.310413][T20409] kernfs_new_node+0x5f/0xd0 [ 234.315066][T20409] __kernfs_create_file+0x49/0x180 [ 234.320173][T20409] ? dev_attr_show+0x90/0x90 [ 234.324817][T20409] sysfs_add_file_mode_ns+0x136/0x1b0 [ 234.330352][T20409] internal_create_group+0x2e4/0x800 [ 234.335646][T20409] sysfs_create_groups+0x3c/0xe0 [ 234.340641][T20409] device_add_attrs+0x69/0x400 [ 234.345461][T20409] ? kobject_put+0xd8/0x160 [ 234.350200][T20409] device_add+0x431/0x8b0 [ 234.354529][T20409] netdev_register_kobject+0xfc/0x230 [ 234.359900][T20409] register_netdevice+0x86f/0xd60 [ 234.364955][T20409] ? validate_linkmsg+0x511/0x590 [ 234.369986][T20409] ipvlan_link_new+0x295/0x5c0 [ 234.374761][T20409] ? ipvlan_route_v6_outbound+0x1e0/0x1e0 [ 234.380566][T20409] rtnl_newlink+0xee5/0x1670 [ 234.385164][T20409] ? security_capable+0x5e/0x80 [ 234.390034][T20409] ? ns_capable+0x7c/0xb0 [ 234.394459][T20409] ? rtnl_setlink+0x300/0x300 [ 234.399138][T20409] rtnetlink_rcv_msg+0x807/0x8c0 [ 234.404088][T20409] ? memcg_list_lru_alloc+0xd5/0x750 [ 234.409400][T20409] ? mod_objcg_state+0x357/0x580 [ 234.414339][T20409] ? slab_post_alloc_hook+0x82/0x2f0 [ 234.419628][T20409] ? kmem_cache_free+0x1d9/0x380 [ 234.424566][T20409] ? __kfree_skb+0x104/0x140 [ 234.429236][T20409] ? nlmon_xmit+0x4b/0x60 [ 234.433564][T20409] ? __kfree_skb+0x104/0x140 [ 234.438141][T20409] ? consume_skb+0x57/0x180 [ 234.442632][T20409] ? nlmon_xmit+0x4b/0x60 [ 234.446989][T20409] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 234.452337][T20409] ? __dev_queue_xmit+0xaae/0x1d80 [ 234.457495][T20409] ? ref_tracker_free+0x3a1/0x400 [ 234.462563][T20409] netlink_rcv_skb+0x126/0x220 [ 234.467432][T20409] ? rtnetlink_bind+0x60/0x60 [ 234.472313][T20409] rtnetlink_rcv+0x1c/0x20 [ 234.476728][T20409] netlink_unicast+0x589/0x650 [ 234.481562][T20409] netlink_sendmsg+0x66e/0x770 [ 234.486316][T20409] ? netlink_getsockopt+0x3e0/0x3e0 [ 234.491549][T20409] ____sys_sendmsg+0x37c/0x4d0 [ 234.496342][T20409] __sys_sendmsg+0x1e9/0x270 [ 234.500928][T20409] __x64_sys_sendmsg+0x46/0x50 [ 234.505791][T20409] do_syscall_64+0x44/0x110 [ 234.510364][T20409] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 234.516250][T20409] RIP: 0033:0x7f4feb1a7ce9 [ 234.520713][T20409] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 234.540401][T20409] RSP: 002b:00007f4fea52a0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 234.548812][T20409] RAX: ffffffffffffffda RBX: 00007f4feb2c6f80 RCX: 00007f4feb1a7ce9 [ 234.556771][T20409] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 234.564781][T20409] RBP: 00007f4fea52a120 R08: 0000000000000000 R09: 0000000000000000 [ 234.572826][T20409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.580785][T20409] R13: 000000000000000b R14: 00007f4feb2c6f80 R15: 00007ffcb2e71028 [ 234.588900][T20409] [ 234.591909][T20413] CPU: 0 PID: 20413 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 234.602401][T20413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 234.612532][T20413] Call Trace: [ 234.615821][T20413] [ 234.618798][T20413] dump_stack_lvl+0xda/0x130 [ 234.623502][T20413] dump_stack+0x15/0x20 [ 234.627752][T20413] should_fail_ex+0x21f/0x230 14:27:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2401, 0x0, 0x0, 0x600000}) 14:27:38 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 35) [ 234.632457][T20413] ? ext4_htree_store_dirent+0x5d/0x290 [ 234.638070][T20413] __should_failslab+0x92/0xa0 [ 234.642865][T20413] should_failslab+0x9/0x20 [ 234.646593][T20417] ipvlan15: entered promiscuous mode [ 234.647381][T20413] __kmem_cache_alloc_node+0x4e/0x210 [ 234.647413][T20413] ? ext4_htree_store_dirent+0x5d/0x290 [ 234.663681][T20413] __kmalloc+0x95/0x1a0 [ 234.665505][T20417] bridge0: port 2(ipvlan15) entered blocking state [ 234.667838][T20413] ext4_htree_store_dirent+0x5d/0x290 [ 234.667869][T20413] htree_dirblock_to_tree+0x4c3/0x630 [ 234.674407][T20417] bridge0: port 2(ipvlan15) entered disabled state [ 234.679698][T20413] ext4_htree_fill_tree+0x429/0x9b0 [ 234.679736][T20413] ? __find_get_block+0x663/0x890 [ 234.679761][T20413] ? slab_post_alloc_hook+0x82/0x2f0 [ 234.687035][T20417] ipvlan15: entered allmulticast mode [ 234.691650][T20413] ? ext4_readdir+0x2b3/0x1ac0 [ 234.696839][T20417] bridge0: entered allmulticast mode [ 234.701830][T20413] ext4_readdir+0x15b0/0x1ac0 [ 234.709921][T20417] ipvlan15: left allmulticast mode [ 234.712470][T20413] ? down_read_killable+0x170/0x6b0 [ 234.717260][T20417] bridge0: left allmulticast mode [ 234.722506][T20413] ? fsnotify_perm+0x360/0x380 [ 234.722532][T20413] iterate_dir+0x128/0x300 [ 234.752109][T20413] exportfs_get_name+0x230/0x2a0 [ 234.757070][T20413] ? exportfs_decode_fh+0x70/0x70 [ 234.762127][T20413] reconnect_path+0x158/0x3e0 [ 234.766794][T20413] exportfs_decode_fh_raw+0x184/0x400 [ 234.772189][T20413] ? do_handle_open+0x3d0/0x3d0 [ 234.777039][T20413] ? do_handle_open+0x3d0/0x3d0 [ 234.781943][T20413] exportfs_decode_fh+0x3c/0x70 [ 234.786797][T20413] do_handle_open+0x2df/0x3d0 [ 234.791474][T20413] __x64_sys_open_by_handle_at+0x46/0x50 [ 234.797174][T20413] do_syscall_64+0x44/0x110 [ 234.801696][T20413] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 234.807596][T20413] RIP: 0033:0x7fbc0d2a7ce9 [ 234.811993][T20413] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:39 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 16) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 234.831634][T20413] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 234.840045][T20413] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 234.848056][T20413] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 234.856129][T20413] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 234.864218][T20413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.872289][T20413] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 234.880316][T20413] 14:27:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2500, 0x0, 0x0, 0x600000}) 14:27:39 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 234.902882][T20425] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 234.916128][T20429] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 234.930017][T20422] ip6gre0: Master is either lo or non-ether device [ 234.937809][T20430] FAULT_INJECTION: forcing a failure. [ 234.937809][T20430] name failslab, interval 1, probability 0, space 0, times 0 [ 234.950493][T20430] CPU: 0 PID: 20430 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 234.961047][T20430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 234.971125][T20430] Call Trace: [ 234.974404][T20430] [ 234.977327][T20430] dump_stack_lvl+0xda/0x130 [ 234.981953][T20430] dump_stack+0x15/0x20 [ 234.986100][T20430] should_fail_ex+0x21f/0x230 [ 234.990786][T20430] ? ext4_htree_store_dirent+0x5d/0x290 [ 234.996352][T20430] __should_failslab+0x92/0xa0 [ 235.001146][T20430] should_failslab+0x9/0x20 [ 235.005735][T20430] __kmem_cache_alloc_node+0x4e/0x210 [ 235.011225][T20430] ? ext4_htree_store_dirent+0x5d/0x290 [ 235.016796][T20430] __kmalloc+0x95/0x1a0 [ 235.020982][T20430] ext4_htree_store_dirent+0x5d/0x290 [ 235.026420][T20430] htree_dirblock_to_tree+0x4c3/0x630 [ 235.031970][T20430] ext4_htree_fill_tree+0x429/0x9b0 [ 235.037499][T20430] ? _raw_spin_unlock+0x26/0x40 [ 235.042367][T20430] ? __find_get_block+0x5d2/0x890 [ 235.042704][T20437] ipvlan22: entered promiscuous mode 14:27:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008000ae) 14:27:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x4) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r5 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r5, r4, 0x0, 0x100800001) 14:27:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2501, 0x0, 0x0, 0x600000}) [ 235.047399][T20430] ? slab_post_alloc_hook+0x82/0x2f0 [ 235.047432][T20430] ? ext4_readdir+0x2b3/0x1ac0 [ 235.062872][T20430] ext4_readdir+0x15b0/0x1ac0 [ 235.067630][T20430] ? down_read_killable+0x170/0x6b0 [ 235.072884][T20430] ? fsnotify_perm+0x360/0x380 [ 235.077774][T20430] iterate_dir+0x128/0x300 [ 235.082261][T20430] exportfs_get_name+0x230/0x2a0 [ 235.087263][T20430] ? exportfs_decode_fh+0x70/0x70 [ 235.092441][T20430] reconnect_path+0x158/0x3e0 [ 235.097142][T20430] exportfs_decode_fh_raw+0x184/0x400 [ 235.102521][T20430] ? do_handle_open+0x3d0/0x3d0 [ 235.107397][T20430] ? do_handle_open+0x3d0/0x3d0 [ 235.112242][T20430] exportfs_decode_fh+0x3c/0x70 [ 235.117089][T20430] do_handle_open+0x2df/0x3d0 [ 235.121815][T20430] __x64_sys_open_by_handle_at+0x46/0x50 [ 235.127506][T20430] do_syscall_64+0x44/0x110 [ 235.132002][T20430] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 235.137944][T20430] RIP: 0033:0x7fbc0d2a7ce9 [ 235.142436][T20430] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 235.162075][T20430] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 235.170487][T20430] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 235.178525][T20430] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 235.186516][T20430] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 235.194532][T20430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:39 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 17) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 235.202554][T20430] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 235.210561][T20430] 14:27:39 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2600, 0x0, 0x0, 0x600000}) [ 235.248222][T20446] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 235.263925][T20447] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 235.281099][T20449] ipvlan15: entered promiscuous mode [ 235.289298][T20444] FAULT_INJECTION: forcing a failure. 14:27:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080015e) [ 235.289298][T20444] name failslab, interval 1, probability 0, space 0, times 0 [ 235.301973][T20444] CPU: 0 PID: 20444 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 235.312575][T20444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 235.322761][T20444] Call Trace: [ 235.325338][T20449] bridge0: port 2(ipvlan15) entered blocking state [ 235.326077][T20444] [ 235.326085][T20444] dump_stack_lvl+0xda/0x130 [ 235.332640][T20449] bridge0: port 2(ipvlan15) entered disabled state 14:27:39 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 235.335497][T20444] dump_stack+0x15/0x20 [ 235.341757][T20449] ipvlan15: entered allmulticast mode [ 235.346559][T20444] should_fail_ex+0x21f/0x230 [ 235.350755][T20449] bridge0: entered allmulticast mode [ 235.351230][T20449] ipvlan15: left allmulticast mode [ 235.356163][T20444] ? ext4_htree_store_dirent+0x5d/0x290 [ 235.361046][T20449] bridge0: left allmulticast mode [ 235.366445][T20444] __should_failslab+0x92/0xa0 [ 235.366474][T20444] should_failslab+0x9/0x20 [ 235.391845][T20444] __kmem_cache_alloc_node+0x4e/0x210 14:27:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x4) (async) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x4) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r5 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r5, r4, 0x0, 0x100800001) (async) sendfile(r5, r4, 0x0, 0x100800001) [ 235.397229][T20444] ? ext4_htree_store_dirent+0x5d/0x290 [ 235.402797][T20444] __kmalloc+0x95/0x1a0 [ 235.406964][T20444] ext4_htree_store_dirent+0x5d/0x290 [ 235.412391][T20444] htree_dirblock_to_tree+0x4c3/0x630 [ 235.417798][T20444] ext4_htree_fill_tree+0x429/0x9b0 [ 235.423163][T20444] ? _raw_spin_unlock+0x26/0x40 [ 235.428036][T20444] ? __find_get_block+0x5d2/0x890 [ 235.433129][T20444] ? slab_post_alloc_hook+0x82/0x2f0 [ 235.438415][T20444] ? ext4_readdir+0x2b3/0x1ac0 [ 235.443164][T20444] ext4_readdir+0x15b0/0x1ac0 [ 235.447853][T20444] ? down_read_killable+0x170/0x6b0 [ 235.453045][T20444] ? fsnotify_perm+0x360/0x380 [ 235.458008][T20444] iterate_dir+0x128/0x300 [ 235.462415][T20444] exportfs_get_name+0x230/0x2a0 [ 235.467411][T20444] ? exportfs_decode_fh+0x70/0x70 [ 235.472506][T20444] reconnect_path+0x158/0x3e0 [ 235.477216][T20444] exportfs_decode_fh_raw+0x184/0x400 [ 235.482633][T20444] ? do_handle_open+0x3d0/0x3d0 [ 235.487481][T20444] ? do_handle_open+0x3d0/0x3d0 [ 235.492366][T20444] exportfs_decode_fh+0x3c/0x70 [ 235.497256][T20444] do_handle_open+0x2df/0x3d0 [ 235.501926][T20444] __x64_sys_open_by_handle_at+0x46/0x50 [ 235.507557][T20444] do_syscall_64+0x44/0x110 [ 235.512159][T20444] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 235.518114][T20444] RIP: 0033:0x7fbc0d2a7ce9 [ 235.522534][T20444] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:39 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 18) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 235.542486][T20444] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 235.550958][T20444] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 235.559059][T20444] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 235.567059][T20444] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 235.575176][T20444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.583230][T20444] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 235.591190][T20444] 14:27:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2601, 0x0, 0x0, 0x600000}) [ 235.633932][T20457] FAULT_INJECTION: forcing a failure. [ 235.633932][T20457] name failslab, interval 1, probability 0, space 0, times 0 [ 235.637399][T20454] ipvlan22: entered promiscuous mode [ 235.646772][T20457] CPU: 0 PID: 20457 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 235.646797][T20457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 235.646807][T20457] Call Trace: [ 235.646812][T20457] [ 235.646818][T20457] dump_stack_lvl+0xda/0x130 [ 235.683524][T20457] dump_stack+0x15/0x20 [ 235.687769][T20457] should_fail_ex+0x21f/0x230 [ 235.692460][T20457] ? ext4_htree_store_dirent+0x5d/0x290 [ 235.698178][T20457] __should_failslab+0x92/0xa0 [ 235.702934][T20457] should_failslab+0x9/0x20 [ 235.707461][T20457] __kmem_cache_alloc_node+0x4e/0x210 [ 235.712881][T20457] ? ext4_htree_store_dirent+0x5d/0x290 [ 235.718540][T20457] __kmalloc+0x95/0x1a0 [ 235.722708][T20457] ext4_htree_store_dirent+0x5d/0x290 [ 235.728171][T20457] htree_dirblock_to_tree+0x4c3/0x630 [ 235.733593][T20457] ext4_htree_fill_tree+0x429/0x9b0 [ 235.738854][T20457] ? __find_get_block+0x663/0x890 [ 235.743960][T20457] ? slab_post_alloc_hook+0x82/0x2f0 [ 235.749250][T20457] ? ext4_readdir+0x2b3/0x1ac0 [ 235.754136][T20457] ext4_readdir+0x15b0/0x1ac0 [ 235.758891][T20457] ? down_read_killable+0x170/0x6b0 [ 235.764160][T20457] ? fsnotify_perm+0x360/0x380 [ 235.769140][T20457] iterate_dir+0x128/0x300 [ 235.773564][T20457] exportfs_get_name+0x230/0x2a0 [ 235.778574][T20457] ? exportfs_decode_fh+0x70/0x70 [ 235.783674][T20457] reconnect_path+0x158/0x3e0 [ 235.788484][T20457] exportfs_decode_fh_raw+0x184/0x400 [ 235.793867][T20457] ? do_handle_open+0x3d0/0x3d0 [ 235.798719][T20457] ? do_handle_open+0x3d0/0x3d0 [ 235.803566][T20457] exportfs_decode_fh+0x3c/0x70 [ 235.808583][T20457] do_handle_open+0x2df/0x3d0 [ 235.813427][T20457] __x64_sys_open_by_handle_at+0x46/0x50 [ 235.819053][T20457] do_syscall_64+0x44/0x110 [ 235.823550][T20457] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 235.829584][T20457] RIP: 0033:0x7fbc0d2a7ce9 [ 235.833986][T20457] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 235.853582][T20457] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 235.862020][T20457] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 235.869998][T20457] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 14:27:40 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 19) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2700, 0x0, 0x0, 0x600000}) [ 235.878012][T20457] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 235.885972][T20457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.893965][T20457] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 235.901936][T20457] [ 235.907763][T20462] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:40 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800160) [ 235.927148][T20466] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async, rerun: 64) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async, rerun: 64) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x4) (rerun: 64) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r5 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r5, r4, 0x0, 0x100800001) [ 235.963485][T20479] ipvlan15: entered promiscuous mode [ 235.978428][T20479] bridge0: port 2(ipvlan15) entered blocking state [ 235.985057][T20479] bridge0: port 2(ipvlan15) entered disabled state [ 235.993039][T20474] FAULT_INJECTION: forcing a failure. [ 235.993039][T20474] name failslab, interval 1, probability 0, space 0, times 0 [ 236.004202][T20479] ipvlan15: entered allmulticast mode 14:27:40 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 236.005724][T20474] CPU: 0 PID: 20474 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 236.011049][T20479] bridge0: entered allmulticast mode [ 236.021396][T20474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 236.021412][T20474] Call Trace: [ 236.021467][T20474] [ 236.031993][T20479] ipvlan15: left allmulticast mode [ 236.036775][T20474] dump_stack_lvl+0xda/0x130 [ 236.040146][T20479] bridge0: left allmulticast mode [ 236.042975][T20474] dump_stack+0x15/0x20 14:27:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000180), 0x1710a2, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 236.061891][T20474] should_fail_ex+0x21f/0x230 [ 236.066634][T20474] ? ext4_htree_store_dirent+0x5d/0x290 [ 236.072199][T20474] __should_failslab+0x92/0xa0 [ 236.077018][T20474] should_failslab+0x9/0x20 [ 236.081550][T20474] __kmem_cache_alloc_node+0x4e/0x210 [ 236.086986][T20474] ? ext4_htree_store_dirent+0x5d/0x290 [ 236.092638][T20474] __kmalloc+0x95/0x1a0 [ 236.096787][T20474] ext4_htree_store_dirent+0x5d/0x290 [ 236.102245][T20474] htree_dirblock_to_tree+0x4c3/0x630 [ 236.107653][T20474] ext4_htree_fill_tree+0x429/0x9b0 [ 236.112841][T20474] ? _raw_spin_unlock+0x26/0x40 [ 236.117679][T20474] ? __find_get_block+0x5d2/0x890 [ 236.122782][T20474] ? slab_post_alloc_hook+0x82/0x2f0 [ 236.128105][T20474] ext4_readdir+0x15b0/0x1ac0 [ 236.132777][T20474] ? down_read_killable+0x170/0x6b0 [ 236.137964][T20474] ? fsnotify_perm+0x360/0x380 [ 236.142716][T20474] iterate_dir+0x128/0x300 [ 236.147119][T20474] exportfs_get_name+0x230/0x2a0 [ 236.152050][T20474] ? exportfs_decode_fh+0x70/0x70 [ 236.157063][T20474] reconnect_path+0x158/0x3e0 [ 236.161758][T20474] exportfs_decode_fh_raw+0x184/0x400 [ 236.167134][T20474] ? do_handle_open+0x3d0/0x3d0 [ 236.172007][T20474] ? do_handle_open+0x3d0/0x3d0 [ 236.176889][T20474] exportfs_decode_fh+0x3c/0x70 [ 236.181746][T20474] do_handle_open+0x2df/0x3d0 [ 236.186497][T20474] __x64_sys_open_by_handle_at+0x46/0x50 [ 236.192247][T20474] do_syscall_64+0x44/0x110 [ 236.196824][T20474] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 236.202784][T20474] RIP: 0033:0x7fbc0d2a7ce9 [ 236.207236][T20474] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 236.226835][T20474] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 236.235237][T20474] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 236.243369][T20474] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 236.251590][T20474] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 14:27:40 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 20) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800162) [ 236.259615][T20474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 236.267738][T20474] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 236.275893][T20474] [ 236.281507][T20482] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 236.307329][T20495] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2701, 0x0, 0x0, 0x600000}) [ 236.335614][T20491] ipvlan22: entered promiscuous mode [ 236.341605][T20497] FAULT_INJECTION: forcing a failure. [ 236.341605][T20497] name failslab, interval 1, probability 0, space 0, times 0 [ 236.354453][T20497] CPU: 1 PID: 20497 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 236.365062][T20497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 236.375418][T20497] Call Trace: [ 236.378716][T20497] [ 236.381726][T20497] dump_stack_lvl+0xda/0x130 [ 236.386423][T20497] dump_stack+0x15/0x20 [ 236.390579][T20497] should_fail_ex+0x21f/0x230 [ 236.395314][T20497] ? ext4_htree_store_dirent+0x5d/0x290 [ 236.400871][T20497] __should_failslab+0x92/0xa0 [ 236.405661][T20497] should_failslab+0x9/0x20 [ 236.410158][T20497] __kmem_cache_alloc_node+0x4e/0x210 [ 236.415682][T20497] ? ext4_htree_store_dirent+0x5d/0x290 [ 236.421310][T20497] __kmalloc+0x95/0x1a0 [ 236.425549][T20497] ext4_htree_store_dirent+0x5d/0x290 [ 236.430989][T20497] htree_dirblock_to_tree+0x4c3/0x630 [ 236.436380][T20497] ext4_htree_fill_tree+0x429/0x9b0 [ 236.441628][T20497] ? _raw_spin_unlock+0x26/0x40 [ 236.446487][T20497] ? __find_get_block+0x5d2/0x890 [ 236.451642][T20497] ? slab_post_alloc_hook+0x82/0x2f0 [ 236.456948][T20497] ? ext4_readdir+0x2b3/0x1ac0 [ 236.461788][T20497] ext4_readdir+0x15b0/0x1ac0 [ 236.466548][T20497] ? down_read_killable+0x170/0x6b0 [ 236.471766][T20497] ? fsnotify_perm+0x360/0x380 [ 236.476528][T20497] iterate_dir+0x128/0x300 [ 236.480989][T20497] exportfs_get_name+0x230/0x2a0 [ 236.485996][T20497] ? exportfs_decode_fh+0x70/0x70 [ 236.491009][T20497] reconnect_path+0x158/0x3e0 [ 236.495673][T20497] exportfs_decode_fh_raw+0x184/0x400 [ 236.501203][T20497] ? do_handle_open+0x3d0/0x3d0 [ 236.506158][T20497] ? do_handle_open+0x3d0/0x3d0 [ 236.511007][T20497] exportfs_decode_fh+0x3c/0x70 [ 236.515881][T20497] do_handle_open+0x2df/0x3d0 [ 236.520650][T20497] __x64_sys_open_by_handle_at+0x46/0x50 [ 236.526279][T20497] do_syscall_64+0x44/0x110 [ 236.530831][T20497] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 236.536719][T20497] RIP: 0033:0x7fbc0d2a7ce9 [ 236.541202][T20497] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 236.560813][T20497] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 236.569229][T20497] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 236.577368][T20497] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 14:27:40 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 21) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2800, 0x0, 0x0, 0x600000}) 14:27:40 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000180), 0x1710a2, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 236.585338][T20497] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 236.593305][T20497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 236.601286][T20497] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 236.609344][T20497] [ 236.612418][T20501] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800166) 14:27:40 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 236.662729][T20511] ipvlan15: entered promiscuous mode [ 236.677788][T20511] bridge0: port 2(ipvlan15) entered blocking state [ 236.684695][T20511] bridge0: port 2(ipvlan15) entered disabled state [ 236.692119][T20511] ipvlan15: entered allmulticast mode [ 236.697719][T20511] bridge0: entered allmulticast mode [ 236.717084][T20511] ipvlan15: left allmulticast mode [ 236.718219][T20512] FAULT_INJECTION: forcing a failure. [ 236.718219][T20512] name failslab, interval 1, probability 0, space 0, times 0 [ 236.722782][T20511] bridge0: left allmulticast mode [ 236.735591][T20512] CPU: 0 PID: 20512 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 236.751645][T20512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 236.761709][T20512] Call Trace: 14:27:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000180), 0x1710a2, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000440)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000380)={0xb8, r3, 0x1, 0x1, 0x0, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x68, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @void, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x26, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @mesh_chsw={0x76, 0x6, {0x0, 0xe0, 0x3f, 0x5}}]}]]}, 0xb8}}, 0x8040) mount$9p_xen(&(0x7f00000004c0), &(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540), 0x108420, &(0x7f0000000600)={'trans=xen,', {[{@fscache}, {@access_uid={'access', 0x3d, 0xee00}}, {@posixacl}, {@noextend}, {@noextend}, {@mmap}, {@cache_loose}], [{@subj_role={'subj_role', 0x3d, '\x94)\xec\'-\xef'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) r6 = socket(0x40000000002, 0x3, 0x9) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000700)=0xe871, 0x4) mount$tmpfs(0x0, &(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000780), 0x800000, &(0x7f00000007c0)=ANY=[@ANYBLOB="687467653d6e657665722c7569dc01", @ANYRESHEX=0xee01, @ANYBLOB=',seclabel,euid>', @ANYRESDEC, @ANYBLOB=',\x00']) getsockname$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000006c0)=0x1c) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) move_mount(r0, &(0x7f0000000040)='./bus\x00', r1, &(0x7f0000000080)='./file0\x00', 0x102) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r7, r0, 0x0, 0x100800001) [ 236.764987][T20512] [ 236.767933][T20512] dump_stack_lvl+0xda/0x130 [ 236.772552][T20512] dump_stack+0x15/0x20 [ 236.776759][T20512] should_fail_ex+0x21f/0x230 [ 236.781567][T20512] ? ext4_htree_store_dirent+0x5d/0x290 [ 236.787159][T20512] __should_failslab+0x92/0xa0 [ 236.792025][T20512] should_failslab+0x9/0x20 [ 236.796641][T20512] __kmem_cache_alloc_node+0x4e/0x210 [ 236.802068][T20512] ? ext4_htree_store_dirent+0x5d/0x290 [ 236.807634][T20512] __kmalloc+0x95/0x1a0 [ 236.813021][T20512] ext4_htree_store_dirent+0x5d/0x290 [ 236.818446][T20512] htree_dirblock_to_tree+0x4c3/0x630 [ 236.823836][T20512] ext4_htree_fill_tree+0x429/0x9b0 [ 236.829026][T20512] ? _raw_spin_unlock+0x26/0x40 [ 236.833866][T20512] ? __find_get_block+0x5d2/0x890 [ 236.838956][T20512] ? slab_post_alloc_hook+0x82/0x2f0 [ 236.844299][T20512] ? ext4_readdir+0x2b3/0x1ac0 [ 236.849127][T20512] ext4_readdir+0x15b0/0x1ac0 [ 236.853964][T20512] ? down_read_killable+0x170/0x6b0 [ 236.859313][T20512] ? fsnotify_perm+0x360/0x380 [ 236.864220][T20512] iterate_dir+0x128/0x300 [ 236.868638][T20512] exportfs_get_name+0x230/0x2a0 [ 236.873576][T20512] ? exportfs_decode_fh+0x70/0x70 [ 236.878617][T20512] reconnect_path+0x158/0x3e0 [ 236.883320][T20512] exportfs_decode_fh_raw+0x184/0x400 [ 236.888725][T20512] ? do_handle_open+0x3d0/0x3d0 [ 236.893932][T20512] ? do_handle_open+0x3d0/0x3d0 [ 236.898780][T20512] exportfs_decode_fh+0x3c/0x70 [ 236.903639][T20512] do_handle_open+0x2df/0x3d0 [ 236.908327][T20512] __x64_sys_open_by_handle_at+0x46/0x50 [ 236.914042][T20512] do_syscall_64+0x44/0x110 [ 236.918550][T20512] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 236.924464][T20512] RIP: 0033:0x7fbc0d2a7ce9 [ 236.929242][T20512] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 236.948921][T20512] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 236.957398][T20512] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 236.965506][T20512] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 236.973478][T20512] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 236.981460][T20512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 236.989497][T20512] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 236.991809][T20536] ext4: Unknown parameter 'trans' [ 236.997451][T20512] 14:27:41 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 22) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800210) [ 237.011364][T20522] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 237.017750][T20536] tmpfs: Unknown parameter 'htge' [ 237.034622][T20521] ipvlan22: entered promiscuous mode [ 237.055595][T20539] FAULT_INJECTION: forcing a failure. [ 237.055595][T20539] name failslab, interval 1, probability 0, space 0, times 0 14:27:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800212) [ 237.068314][T20539] CPU: 0 PID: 20539 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 237.079029][T20539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 237.089091][T20539] Call Trace: [ 237.092406][T20539] [ 237.095412][T20539] dump_stack_lvl+0xda/0x130 [ 237.100000][T20539] dump_stack+0x15/0x20 [ 237.104248][T20539] should_fail_ex+0x21f/0x230 [ 237.109026][T20539] ? ext4_htree_store_dirent+0x5d/0x290 [ 237.114571][T20539] __should_failslab+0x92/0xa0 [ 237.119349][T20539] should_failslab+0x9/0x20 [ 237.123923][T20539] __kmem_cache_alloc_node+0x4e/0x210 [ 237.129280][T20539] ? ext4_htree_store_dirent+0x5d/0x290 [ 237.134880][T20539] __kmalloc+0x95/0x1a0 [ 237.139027][T20539] ext4_htree_store_dirent+0x5d/0x290 [ 237.144457][T20539] htree_dirblock_to_tree+0x4c3/0x630 [ 237.149881][T20539] ext4_htree_fill_tree+0x429/0x9b0 [ 237.155119][T20539] ? _raw_spin_unlock+0x26/0x40 [ 237.160000][T20539] ? __find_get_block+0x5d2/0x890 [ 237.165017][T20539] ? slab_post_alloc_hook+0x82/0x2f0 [ 237.170289][T20539] ? ext4_readdir+0x2b3/0x1ac0 [ 237.175105][T20539] ext4_readdir+0x15b0/0x1ac0 [ 237.179858][T20539] ? down_read_killable+0x170/0x6b0 [ 237.185123][T20539] ? fsnotify_perm+0x360/0x380 [ 237.189879][T20539] iterate_dir+0x128/0x300 [ 237.194297][T20539] exportfs_get_name+0x230/0x2a0 [ 237.199244][T20539] ? exportfs_decode_fh+0x70/0x70 [ 237.204271][T20539] reconnect_path+0x158/0x3e0 [ 237.209001][T20539] exportfs_decode_fh_raw+0x184/0x400 [ 237.214437][T20539] ? do_handle_open+0x3d0/0x3d0 [ 237.219291][T20539] ? do_handle_open+0x3d0/0x3d0 [ 237.224224][T20539] exportfs_decode_fh+0x3c/0x70 [ 237.229080][T20539] do_handle_open+0x2df/0x3d0 [ 237.233824][T20539] __x64_sys_open_by_handle_at+0x46/0x50 [ 237.239449][T20539] do_syscall_64+0x44/0x110 [ 237.244120][T20539] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 237.250127][T20539] RIP: 0033:0x7fbc0d2a7ce9 [ 237.254601][T20539] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 237.274363][T20539] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 237.282761][T20539] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 237.290759][T20539] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 237.299239][T20539] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 237.307222][T20539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:41 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 23) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2801, 0x0, 0x0, 0x600000}) 14:27:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000440)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000380)={0xb8, r3, 0x1, 0x1, 0x0, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x68, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @void, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x26, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @mesh_chsw={0x76, 0x6, {0x0, 0xe0, 0x3f, 0x5}}]}]]}, 0xb8}}, 0x8040) (async) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000380)={0xb8, r3, 0x1, 0x1, 0x0, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x68, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @void, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x26, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @mesh_chsw={0x76, 0x6, {0x0, 0xe0, 0x3f, 0x5}}]}]]}, 0xb8}}, 0x8040) mount$9p_xen(&(0x7f00000004c0), &(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540), 0x108420, &(0x7f0000000600)={'trans=xen,', {[{@fscache}, {@access_uid={'access', 0x3d, 0xee00}}, {@posixacl}, {@noextend}, {@noextend}, {@mmap}, {@cache_loose}], [{@subj_role={'subj_role', 0x3d, '\x94)\xec\'-\xef'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) r6 = socket(0x40000000002, 0x3, 0x9) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000700)=0xe871, 0x4) mount$tmpfs(0x0, &(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000780), 0x800000, &(0x7f00000007c0)=ANY=[@ANYBLOB="687467653d6e657665722c7569dc01", @ANYRESHEX=0xee01, @ANYBLOB=',seclabel,euid>', @ANYRESDEC, @ANYBLOB=',\x00']) getsockname$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000006c0)=0x1c) (async) getsockname$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000006c0)=0x1c) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) move_mount(r0, &(0x7f0000000040)='./bus\x00', r1, &(0x7f0000000080)='./file0\x00', 0x102) (async) move_mount(r0, &(0x7f0000000040)='./bus\x00', r1, &(0x7f0000000080)='./file0\x00', 0x102) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r7, r0, 0x0, 0x100800001) 14:27:41 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 237.315434][T20539] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 237.323439][T20539] 14:27:41 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 237.368990][T20551] ipvlan15: entered promiscuous mode [ 237.382984][T20551] bridge0: port 2(ipvlan15) entered blocking state [ 237.389715][T20551] bridge0: port 2(ipvlan15) entered disabled state [ 237.401116][T20551] ipvlan15: entered allmulticast mode [ 237.406659][T20551] bridge0: entered allmulticast mode 14:27:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800214) [ 237.420952][T20551] ipvlan15: left allmulticast mode [ 237.426175][T20551] bridge0: left allmulticast mode [ 237.435236][T20550] FAULT_INJECTION: forcing a failure. [ 237.435236][T20550] name failslab, interval 1, probability 0, space 0, times 0 [ 237.447969][T20550] CPU: 0 PID: 20550 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 237.458490][T20550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 237.468626][T20550] Call Trace: [ 237.471930][T20550] [ 237.474851][T20550] dump_stack_lvl+0xda/0x130 [ 237.479454][T20550] dump_stack+0x15/0x20 [ 237.483610][T20550] should_fail_ex+0x21f/0x230 [ 237.488500][T20550] ? ext4_htree_store_dirent+0x5d/0x290 [ 237.494055][T20550] __should_failslab+0x92/0xa0 [ 237.498945][T20550] should_failslab+0x9/0x20 [ 237.503434][T20550] __kmem_cache_alloc_node+0x4e/0x210 [ 237.508797][T20550] ? ext4_htree_store_dirent+0x5d/0x290 [ 237.514330][T20550] __kmalloc+0x95/0x1a0 [ 237.518628][T20550] ext4_htree_store_dirent+0x5d/0x290 [ 237.524090][T20550] htree_dirblock_to_tree+0x4c3/0x630 [ 237.529524][T20550] ext4_htree_fill_tree+0x429/0x9b0 [ 237.534775][T20550] ? _raw_spin_unlock+0x26/0x40 [ 237.539636][T20550] ? __find_get_block+0x5d2/0x890 [ 237.544708][T20550] ? slab_post_alloc_hook+0x82/0x2f0 [ 237.550000][T20550] ? ext4_readdir+0x2b3/0x1ac0 [ 237.554842][T20550] ext4_readdir+0x15b0/0x1ac0 [ 237.559560][T20550] ? down_read_killable+0x170/0x6b0 [ 237.564752][T20550] ? fsnotify_perm+0x360/0x380 [ 237.569534][T20550] iterate_dir+0x128/0x300 [ 237.573947][T20550] exportfs_get_name+0x230/0x2a0 [ 237.578987][T20550] ? exportfs_decode_fh+0x70/0x70 [ 237.584000][T20550] reconnect_path+0x158/0x3e0 [ 237.588800][T20550] exportfs_decode_fh_raw+0x184/0x400 [ 237.594440][T20550] ? do_handle_open+0x3d0/0x3d0 [ 237.599338][T20550] ? do_handle_open+0x3d0/0x3d0 [ 237.604179][T20550] exportfs_decode_fh+0x3c/0x70 [ 237.609024][T20550] do_handle_open+0x2df/0x3d0 [ 237.613713][T20550] __x64_sys_open_by_handle_at+0x46/0x50 [ 237.619334][T20550] do_syscall_64+0x44/0x110 [ 237.623931][T20550] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 237.629822][T20550] RIP: 0033:0x7fbc0d2a7ce9 [ 237.634239][T20550] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 237.653905][T20550] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 237.662323][T20550] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 237.670285][T20550] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 237.678298][T20550] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 237.686391][T20550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 237.694375][T20550] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 237.702339][T20550] [ 237.706534][T20562] ext4: Unknown parameter 'trans' 14:27:41 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 24) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2900, 0x0, 0x0, 0x600000}) 14:27:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async, rerun: 64) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (rerun: 64) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000440)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000380)={0xb8, r3, 0x1, 0x1, 0x0, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x68, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @void, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x26, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @mesh_chsw={0x76, 0x6, {0x0, 0xe0, 0x3f, 0x5}}]}]]}, 0xb8}}, 0x8040) (async) mount$9p_xen(&(0x7f00000004c0), &(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540), 0x108420, &(0x7f0000000600)={'trans=xen,', {[{@fscache}, {@access_uid={'access', 0x3d, 0xee00}}, {@posixacl}, {@noextend}, {@noextend}, {@mmap}, {@cache_loose}], [{@subj_role={'subj_role', 0x3d, '\x94)\xec\'-\xef'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) (async) r6 = socket(0x40000000002, 0x3, 0x9) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) (async, rerun: 64) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000700)=0xe871, 0x4) (rerun: 64) mount$tmpfs(0x0, &(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000780), 0x800000, &(0x7f00000007c0)=ANY=[@ANYBLOB="687467653d6e657665722c7569dc01", @ANYRESHEX=0xee01, @ANYBLOB=',seclabel,euid>', @ANYRESDEC, @ANYBLOB=',\x00']) getsockname$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000006c0)=0x1c) (async, rerun: 64) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async, rerun: 64) move_mount(r0, &(0x7f0000000040)='./bus\x00', r1, &(0x7f0000000080)='./file0\x00', 0x102) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r7, r0, 0x0, 0x100800001) 14:27:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800218) [ 237.721065][T20562] tmpfs: Unknown parameter 'htge' [ 237.735149][T20560] ipvlan22: entered promiscuous mode 14:27:42 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 237.783426][T20567] FAULT_INJECTION: forcing a failure. [ 237.783426][T20567] name failslab, interval 1, probability 0, space 0, times 0 [ 237.796209][T20567] CPU: 1 PID: 20567 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 237.801392][T20573] ipvlan15: entered promiscuous mode [ 237.806728][T20567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 237.806744][T20567] Call Trace: [ 237.806751][T20567] [ 237.806758][T20567] dump_stack_lvl+0xda/0x130 [ 237.822100][T20573] bridge0: port 2(ipvlan15) entered blocking state [ 237.822195][T20567] dump_stack+0x15/0x20 [ 237.825528][T20573] bridge0: port 2(ipvlan15) entered disabled state [ 237.828401][T20567] should_fail_ex+0x21f/0x230 [ 237.833277][T20573] ipvlan15: entered allmulticast mode [ 237.839562][T20567] ? ext4_htree_store_dirent+0x5d/0x290 [ 237.839588][T20567] __should_failslab+0x92/0xa0 [ 237.843722][T20573] bridge0: entered allmulticast mode [ 237.850200][T20567] should_failslab+0x9/0x20 [ 237.850223][T20567] __kmem_cache_alloc_node+0x4e/0x210 [ 237.850249][T20567] ? ext4_htree_store_dirent+0x5d/0x290 [ 237.861601][T20573] ipvlan15: left allmulticast mode [ 237.865845][T20567] __kmalloc+0x95/0x1a0 [ 237.865874][T20567] ext4_htree_store_dirent+0x5d/0x290 [ 237.870629][T20573] bridge0: left allmulticast mode [ 237.875903][T20567] htree_dirblock_to_tree+0x4c3/0x630 [ 237.916327][T20567] ext4_htree_fill_tree+0x429/0x9b0 [ 237.921580][T20567] ? _raw_spin_unlock+0x26/0x40 [ 237.926420][T20567] ? __find_get_block+0x5d2/0x890 [ 237.931465][T20567] ? slab_post_alloc_hook+0x82/0x2f0 [ 237.936848][T20567] ? ext4_readdir+0x2b3/0x1ac0 [ 237.941632][T20567] ext4_readdir+0x15b0/0x1ac0 [ 237.946299][T20567] ? down_read_killable+0x170/0x6b0 [ 237.951497][T20567] ? fsnotify_perm+0x360/0x380 [ 237.956398][T20567] iterate_dir+0x128/0x300 [ 237.960836][T20567] exportfs_get_name+0x230/0x2a0 [ 237.965823][T20567] ? exportfs_decode_fh+0x70/0x70 [ 237.970850][T20567] reconnect_path+0x158/0x3e0 [ 237.975549][T20567] exportfs_decode_fh_raw+0x184/0x400 [ 237.981020][T20567] ? do_handle_open+0x3d0/0x3d0 [ 237.985900][T20567] ? do_handle_open+0x3d0/0x3d0 [ 237.990918][T20567] exportfs_decode_fh+0x3c/0x70 [ 237.995799][T20567] do_handle_open+0x2df/0x3d0 [ 238.000481][T20567] __x64_sys_open_by_handle_at+0x46/0x50 [ 238.006244][T20567] do_syscall_64+0x44/0x110 [ 238.010736][T20567] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 238.016682][T20567] RIP: 0033:0x7fbc0d2a7ce9 [ 238.021119][T20567] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 238.040720][T20567] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 238.049123][T20567] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 238.057178][T20567] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 238.065214][T20567] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 238.073171][T20567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000380), 0x20083, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2b2f015, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) 14:27:42 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:42 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 25) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008002ce) 14:27:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2901, 0x0, 0x0, 0x600000}) [ 238.081127][T20567] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 238.089180][T20567] 14:27:42 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 238.140276][T20585] ipvlan22: entered promiscuous mode [ 238.157123][T20587] FAULT_INJECTION: forcing a failure. [ 238.157123][T20587] name failslab, interval 1, probability 0, space 0, times 0 [ 238.169804][T20587] CPU: 1 PID: 20587 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 238.180298][T20587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 238.190360][T20587] Call Trace: [ 238.193691][T20587] [ 238.196635][T20587] dump_stack_lvl+0xda/0x130 [ 238.201315][T20587] dump_stack+0x15/0x20 [ 238.205600][T20587] should_fail_ex+0x21f/0x230 [ 238.210305][T20587] ? ext4_htree_store_dirent+0x5d/0x290 [ 238.215869][T20587] __should_failslab+0x92/0xa0 [ 238.220711][T20587] should_failslab+0x9/0x20 [ 238.225257][T20587] __kmem_cache_alloc_node+0x4e/0x210 [ 238.230780][T20587] ? ext4_htree_store_dirent+0x5d/0x290 [ 238.236372][T20587] __kmalloc+0x95/0x1a0 [ 238.240545][T20587] ext4_htree_store_dirent+0x5d/0x290 [ 238.245940][T20587] htree_dirblock_to_tree+0x4c3/0x630 [ 238.251382][T20587] ext4_htree_fill_tree+0x429/0x9b0 [ 238.256674][T20587] ? _raw_spin_unlock+0x26/0x40 [ 238.261581][T20587] ? __find_get_block+0x5d2/0x890 [ 238.266681][T20587] ? slab_post_alloc_hook+0x82/0x2f0 [ 238.272068][T20587] ? ext4_readdir+0x2b3/0x1ac0 [ 238.276905][T20587] ext4_readdir+0x15b0/0x1ac0 [ 238.281585][T20587] ? down_read_killable+0x170/0x6b0 [ 238.286807][T20587] ? fsnotify_perm+0x360/0x380 [ 238.291650][T20587] iterate_dir+0x128/0x300 [ 238.296055][T20587] exportfs_get_name+0x230/0x2a0 [ 238.301023][T20587] ? exportfs_decode_fh+0x70/0x70 [ 238.306046][T20587] reconnect_path+0x158/0x3e0 [ 238.310737][T20587] exportfs_decode_fh_raw+0x184/0x400 [ 238.316105][T20587] ? do_handle_open+0x3d0/0x3d0 [ 238.321177][T20587] ? do_handle_open+0x3d0/0x3d0 [ 238.326079][T20587] exportfs_decode_fh+0x3c/0x70 [ 238.330978][T20587] do_handle_open+0x2df/0x3d0 [ 238.335694][T20587] __x64_sys_open_by_handle_at+0x46/0x50 [ 238.341411][T20587] do_syscall_64+0x44/0x110 [ 238.346039][T20587] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 238.351973][T20587] RIP: 0033:0x7fbc0d2a7ce9 [ 238.356368][T20587] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 238.375994][T20587] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 14:27:42 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 26) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 238.384401][T20587] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 238.392357][T20587] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 238.400409][T20587] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 238.408371][T20587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 238.416423][T20587] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 238.424462][T20587] 14:27:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000380), 0x20083, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2b2f015, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000380), 0x20083, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2b2f015, 0x0) (async) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) (async) syz_open_procfs(r0, &(0x7f0000000000)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r2, r1, 0x0, 0x100800001) (async) 14:27:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2a00, 0x0, 0x0, 0x600000}) [ 238.444855][T20593] ipvlan15: entered promiscuous mode [ 238.463822][T20593] bridge0: port 2(ipvlan15) entered blocking state [ 238.470619][T20593] bridge0: port 2(ipvlan15) entered disabled state [ 238.478727][T20593] ipvlan15: entered allmulticast mode [ 238.484174][T20593] bridge0: entered allmulticast mode 14:27:42 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008002d0) 14:27:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000380), 0x20083, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2b2f015, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='mountinfo\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r2, r1, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000380), 0x20083, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./bus\x00', 0x0, 0x2b2f015, 0x0) (async) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) (async) syz_open_procfs(r0, &(0x7f0000000000)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r2, r1, 0x0, 0x100800001) (async) [ 238.501695][T20593] ipvlan15: left allmulticast mode [ 238.506927][T20593] bridge0: left allmulticast mode [ 238.527012][T20600] FAULT_INJECTION: forcing a failure. [ 238.527012][T20600] name failslab, interval 1, probability 0, space 0, times 0 [ 238.539825][T20600] CPU: 0 PID: 20600 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 238.550316][T20600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 238.560456][T20600] Call Trace: [ 238.563725][T20600] [ 238.566670][T20600] dump_stack_lvl+0xda/0x130 [ 238.571291][T20600] dump_stack+0x15/0x20 [ 238.575479][T20600] should_fail_ex+0x21f/0x230 [ 238.580171][T20600] ? ext4_htree_store_dirent+0x5d/0x290 [ 238.585712][T20600] __should_failslab+0x92/0xa0 [ 238.590524][T20600] should_failslab+0x9/0x20 [ 238.595088][T20600] __kmem_cache_alloc_node+0x4e/0x210 [ 238.600447][T20600] ? ext4_htree_store_dirent+0x5d/0x290 [ 238.606060][T20600] __kmalloc+0x95/0x1a0 [ 238.610210][T20600] ext4_htree_store_dirent+0x5d/0x290 [ 238.615578][T20600] htree_dirblock_to_tree+0x4c3/0x630 [ 238.621108][T20600] ext4_htree_fill_tree+0x429/0x9b0 [ 238.626399][T20600] ? _raw_spin_unlock+0x26/0x40 [ 238.631289][T20600] ? __find_get_block+0x5d2/0x890 [ 238.636317][T20600] ? slab_post_alloc_hook+0x82/0x2f0 [ 238.641626][T20600] ? ext4_readdir+0x2b3/0x1ac0 [ 238.646417][T20600] ext4_readdir+0x15b0/0x1ac0 [ 238.651275][T20600] ? down_read_killable+0x170/0x6b0 [ 238.656547][T20600] ? fsnotify_perm+0x360/0x380 [ 238.661295][T20600] iterate_dir+0x128/0x300 [ 238.665737][T20600] exportfs_get_name+0x230/0x2a0 [ 238.670750][T20600] ? exportfs_decode_fh+0x70/0x70 [ 238.675773][T20600] reconnect_path+0x158/0x3e0 [ 238.680443][T20600] exportfs_decode_fh_raw+0x184/0x400 [ 238.685807][T20600] ? do_handle_open+0x3d0/0x3d0 [ 238.690749][T20600] ? do_handle_open+0x3d0/0x3d0 [ 238.695784][T20600] exportfs_decode_fh+0x3c/0x70 [ 238.700687][T20600] do_handle_open+0x2df/0x3d0 [ 238.705357][T20600] __x64_sys_open_by_handle_at+0x46/0x50 [ 238.711004][T20600] do_syscall_64+0x44/0x110 [ 238.715584][T20600] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 238.721546][T20600] RIP: 0033:0x7fbc0d2a7ce9 [ 238.725964][T20600] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:27:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2a01, 0x0, 0x0, 0x600000}) 14:27:43 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 27) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 238.745588][T20600] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 238.754056][T20600] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 238.762073][T20600] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 238.770035][T20600] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 238.778026][T20600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 238.785991][T20600] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 238.793972][T20600] [ 238.820490][T20609] ipvlan22: entered promiscuous mode 14:27:43 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0xe4a5, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0xe0, &(0x7f0000000d00)={&(0x7f0000000600)=ANY=[@ANYBLOB="2c020000", @ANYRES16, @ANYBLOB="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", @ANYRES32=r3], 0x22c}}, 0x0) preadv(r1, &(0x7f0000004d40)=[{&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/230, 0xe6}, {&(0x7f0000003940)=""/4096, 0x1000}, {&(0x7f0000004940)=""/241, 0xf1}, {&(0x7f0000004a40)=""/29, 0x1d}, {&(0x7f0000004a80)=""/160, 0xa0}, {&(0x7f0000004b40)=""/209, 0xd1}, {&(0x7f0000004c40)=""/226, 0xe2}], 0x8, 0x60, 0x4) sendmmsg(r2, &(0x7f0000002040)=[{{&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0xffffffff, @private1={0xfc, 0x1, '\x00', 0x1}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000380)="5ae0f3ea19c8e65e753e256fc82a84cc6c70acfe854fe84272ec8c0ae551c196e09ced1912dedb4e9ebe4f729aa0c3c6d8a4b2cda8591386d3f749fa2c7a8c4d8ad1b608f9b05acfca0f05b9393625a1c7305d8e3bc5cf225112253781c880ac17a66a65511b2a884d7f603603d9d484278ca62808135d37dc896499780f5641ee1e0be6d52e7cac1737d2f37b58911eb97353d9ded1559c25e1386ccd174850579249aca1d6667aa3a3eee076730f434e6ae1476f2f8161f9", 0xb9}, {&(0x7f00000004c0)="38ab5a2baaa9de554a5615b9d221d8e381562850ef6fbb7855a4a462dc75c9e36bba5bb9fc5a1d20b1476840b7c45bd0d1b091d554f599b15a630481dde8a23d3ff34b6acc5ef7728772e2171334751e1d896f24809baa075a7d2a9def59645a5d5d4301f3ffdb5ccea5ab66d05403c96320b0ff467fb5e49d2b5840b884617248292f4b80eb3c965b5e387c2feb01ca392229753410b36bfe4cac36d009028ad71e37b023b381278b5c7bd2ba7564763f3a610a903f466a4ebbdbccb4706dc772", 0xc1}, {&(0x7f0000000080)="fc78a31db7a144d6d71b6ccd2a6f081b9eb8af769cb9faea36fb70c599facb91e5314d8b8b007461db78834e034bc0acbecd0b86c33d1ee6", 0x38}, {&(0x7f0000000600)="5b21187347b56df4f9a8a8ba794694cbddfac23f9c56a2d6f8b360c639e22eb7f4b9f16300239b7b0247a2c3e0de160d0ebd3073fbad85f5b406440656d463875faf3eae600ce307353b6465d61718a9be991b40a2c162e487a101651b05a8baf06d4e83414af7b4e2016b3375530e89bbb9842db8611f99ee632e6ff54ec4886adf388bf5f28f51b751dba3af137b05ea8f81645664c0cee37f7eb14829f1563aa2c1db835628fbcc34e4aa2175f679cab55ceba320d0b10776739fedbe467f4ac701d041a77e595949290a7a8b04e2086736fc7eddaf464b76ca2717ce20159947b6bd93ec55c0a827f689c5fa3b", 0xef}, {&(0x7f0000000700)="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", 0xfb}, {&(0x7f0000000800)="4fbb712bf1a39fc1bff5d32d5acefcc68cc8336ec046436a4be5cb2ddc3bd977ef3f778f8917999380187eba7adcd3c42429da2e981477794e9d51ddb7b26f7858b4f56ca2e669d92665221a43d8e17abb2d18dcf54ec102005948fe1a6145658627e6b13f989a7ef4d3a9535c25e91e65154607366abee7d4201f370cf47a8dd4a5a98f9d8e22986b90a4f19c67f4d1452ea997c30f2c09b6ac4a85ac25f82baf25e911ecaf0833468f3d21438940094498c8d11ac3f2c17c107f2c7399417452601e7dac9399e4d457bb7d9a6e388e7dc247533053d3e330c17ed5d6a804940a5b55b1bffe3cea90ae1b172934c92cef1bf56df3a71213b4d228507c3f05d606ac95ede63d38fdc5205bf870485a0a8e1097f5811a9e6cf5a49ff5a25048c77be8b3d68f90f84ae1bf85b8eb23ba233ff110b9360771f2dcaa22f8457ebfdb2b5a26590c475ac3f019c469acd8c808c00e718858f7a612001defe7157e8d8b7679c9ab9e390e49525b7b0f731a114a7b0b1fbe0469caf720e29915b959d7dd525bb2e2db9200bbf4da00b63ab722be7a24a9d74aff18cebf9b9d82615189271e903ec60b398485dd53eb3247c2a8d450b5a7b4a0e3e09ebeb34fe71b06cd3edc0419c59c07ef6a2639d6dfdb247223df45a70ac94c4ac8c28c11f3bb78f974d41362bb0437c2dd6ad58f8dc0f39bf90a209a7fc53f3e87215c1d41d1d3c823466029d55780e7bf2e0a2ea9e832f84ab3e198c6a242708e5327b520750f58cecea0f6f4148249f4b7552739707ca11eef7546917a8bbd78f70399f5f9ad349d8eb7f2277a936968787e14e5f732f5ea0cc2dca3c3258dfb6c9f601b6d7cc318c4323a632cf8b96607d44a49b611441953a9e88af1e2a3592f1d88584b4c920189f39aa8d69dfd4b0f9e9d13f18c1dfb072d8a4bf6520b4e5945b8b769a9307b726f914bbeb3d83e34e2b6e05a43cc4455366c3415cc3c85de265205948c272efb3767e74c3a61d5726806ac0c05243254230b50305beec38a4670e3d356b146c989d54599ece4b658677dad5aaf4a3fa27eaa25ca30417989b45b3bb3b91e4a1ff331862fcd7284175e7e61cb12dd0dbc0f324399494263cfae37a14229a74aabd25f45593b2645e60fa5508ead9dd69016f42647e8657ab6352afde17510ab7a4526068fb7754e27121bc229c3d924b88424e6ce8da61e3aa0cf9125fc08fb97a2b0c3e1fc23531bc897d164c78652285c28bc7eca64ae0aa6caec99fed9c0020780771ae92c8519b4d6737b0570d1f29aadd1b04790daf63297e392b16749552d8696925015fc671eaf648f32b1f08ae4f7e94365c6d95b23cacb5ee7ce42be1fe10b6d24168ee05a36c620a6d7a3391bf56b50163181b80c7dc005e4e3778e0605e6e23016e29d8bfdab9af6152b6b72611f45b1bba351f5eadfffe4d768cfe145b65f4fb51ecd75e7a2fe5b8d6effc7a7d169106c3137674699689851ba11d5d5ce4a88b3689da68d13c5b44d879053dc2991a404e9d1f70260c9882172eaf2d1f85e0ac6d05045c2ebf07c6f1bcc14c5ec46cd3e96aa4554ed95f1e72084e1597c66b64cd528684ab7c41d47bcdc30695205518b777bd1e90ce0bc9554f21e503c3ec8bf1b0431e03a683a1dc9354999fa02d8622389b2a9cf21b0a3fe89e5c1276419b008580a188f15879c740b32d04abc204c829bc8391ce0534a7623c44824e2fccbcdaea56d80dda30122eca7a9d3ed117e45ac69b28113b3a76197d4c3cc094d624120551f6f4c23dfeaa41851fc39ee7f6f2856426754ca71889bfcbd1fd31eeff08608d64422cb282c9f3b155b839bd494451f7a7b2f268a89a666aef30ccae5df993e13539f8ccba5dd1c250529394b3eaf0e89606a77fb161065987515755a5d514ea55d1013c7c4f195189c289f845084ac8176a40ec78e0efd9af4b9b85256f528a61fff72fea330b625f2c5a81a1b83600a8ce16b68f28e3c75c38e2c967186202278b97d93266be7459825a44275512f2ec2b079e6970e5c5029b178278a36a474d293fbd45b82adcb90b40b37eaa9279c3d8c1d823317bcf5b146df74684b32999de467a573d24b81c6ef47abd5747892067fb76303296c1ec4bd199697fa82dd2e8783859afb44a5741499275874b738b220b46c35172baee44c4eeae78ed7bad29906bbfb6d93e6018499f74a1450d4342cf10ee74b8047827f9929b5ef7be69b2206c9c4a49cd2fe0a3e4c9deb17fe1837820459ace3030836401ce9c9acb923567fa366897185dd27d119ac533b2da441e77c96a5364b77ecdebe51c56c4e7fd2327dc755b5cf030525ea89bd3cc20eb8502c0f780585707b7911b7c21074cf412ff2f8456b660667931568688981eb01dbef7d183ddfa3a2ec7592bb131a1f3e1f94b2abd44896f7f00fd1cf8a910ac47b1c593ddc2a314700e06052f3df605bd3da5f63800efb03d257ef3a343f795a79bc98922288c08eae63b00754b3fb419c80984dc367219c203d1f49a452fede2a820e7fbd6c098dc4a280628d464d39bd297867e8756b0599d185afc7f49b26e47cdec0b5b7c8fd4f67a6f081d0b1d72e13fa8ef4543494fddfd51fa2fdf94ec96760996868db4c6c806df30b864a3c166da871fedf3cf6b6b0443f0c130eeec8083e63469158fc16c19fb42980506f6a131bd2ba91ce12c173037140e77ea55cbb232d03a9dcceeb0583c7d08f629b83f60a2c9e0baea9c6b8c0c64b71de463c46035edee17c7cc2f067b70de691fec8a0e01230d90842273cf93f3d89bf2d06ada3b045c9014f494705fa76a9917cc31e4c1062cff0da611c63c15d80c1ccc3c6699bd9439d279a43dd105cadf9f7ed9f277fd8baae65d024b4df3616637428338ef59dec199ac4aa73c4be77e5fab38504bc4b4e2014c5ae4ba7fecbd26bbbf040345d9abc4a79011cb84965d803cb584f2a417ba610a925db1e838850683b313d67adb9114e2a94da58fcd0847cd36463a53edc7c7473c5f5242bbda7ffa84c84d420e32c8ae19d3e1cfadead14aac475d1494815f1f461d5f0895ead417d515f9c1a3d11683c77627f57dc09856f2160bf0002b31a1b89f09bc5e9c7e5a0dca3ed2fa641efc5b0816d806fc85eeaa3cf75e3bc084d966f43a2e4b228787b5f45175ea8c6e7007802668dbc5bf1abcd03588049ce2739d30441bd8562e2a9d3975195d24a69eb19de73352cc1f1bfbc0cd501dfab303d02ac679147aed5e76ab8645f7b5d9ada63e0c8fa55558209dbdf633d34e30aa9957afe56c83b60160cc3e1e67c9521f426013e875f26a6461a54c043589e8ea2693c51f8c3c052bf64ea72b202095573592c30d27ec9ece9d37f00cecf55318b4ade7eaafbafaefee1e42011486a4016f327826b79f6642821b36d498be8c55c664d06109504919189842a89124665589a5256c13a35db5578e054f04ed10e471196057c502ad3edd0bac828db4e209b887cfc211025de52494ea1cd6b9df8a009ef8e808e5d9067280616063bb81f0e35246d233422928c963200a92cba875b04ea434e0c62b8adcefb07025c17b92cbd9ad5d11f21e5d9b4ff365d447c1122ace02ae41473fe37c21aeab67e5c6e20a4b9ba4e22467675c87de93e68be84d6d4a21d51b9835c30ac8b252c3f832c51ae90f0a8e745ff7f621c25b0d657f73e58e75ebe492bea6cafb62d04e07f38d1807998fef1baadf2e7e4c32d6067da7a2738624735f2f22078c81cede86919dbff0f9cf590f56334039e2f6e325c30ef629b264e3ee5b2556856100705d662c7781f976ce998d0eae1b3c6a62f22ef8a34b9d5de11a3710c92df8e0d019cfca3226a92d501cdfe385076f9a5a550c2e590ada7b9c90fce2ad71d6f84f9f67e96de26e96c2ea20854dcfa505f1c2dac80e426adcbd0769fe4eb324c3eba95f6febe84411f5891d2da0d8efb0ab67733421d5860be9805c1c27ca12fdc9f3341c1a4196099ac735da10737fea6bfcbf2dd64479e6c769bc1d6bbdfdb91054fbffdd93a30daadab2e2934040b6efa67bcff56ef4d760acaeed217b4b2f8fb4042101dcb1d8b803aeaa67884b80db011bd3b7de70ae0acc6a118aa4c433e8afa413e5aef33b89db8fbcdffdb0650d0f212af56fd656431f10b70f8e484ac03545156f1a1238574e52bccaa299968a59478cb04c9185a2c3c5835d55365c8b0859648b7658b53a8fd8d448c93ae5d6333284782a0148d85b0cce01c7087410fe667b60d131921b02e38f0de4466fb6dbf52e5e4e5377f71c03491d9078362a5818647d23be7e801abcb18c43f229b0fc9dc0894c30192492b7fa395d6b7d758d712bbbf197a71e477570a111d6f9a7997d44bb1329aeef73dda86a71e3e395ededa2801d16bd38e08275808bb89084c8caac3e71c883d3d6659fd243b076886b493799a2bc16d98f0a3a2d24d11f6740c62eff047b031fe7e72adc1633b36691e3261f538352d26223b6996948babfd0fd116e07841ed3bf9e9a759250745d4fd44c14047a54da930706e8d1d955b03fa92a93e4f606cb15e52da83d82e7ae8de65f9459cc70915da2e3f199880c52f8affbe811aacc1459b1e050da88196c77c0f27561e95a483e8e5d07e4cdfba9e3fd5c951346157066284a146ee4c6cd1cf87ca047b51201841aa15449faeb385940cba00a819f88c72b85ef7524d24370c6cfe72279902604764cf198e7b5c281bbca36866d34481b2a12e2780a26890f72db2719a9ec891ff92b780f87d5a670b5ebe4eaf9d3b4a2eec138a55f9439d428b6847293be0cf0f41678b2046bddfb9f6b1d2fbea597259b21f440129b02ab5ce060851e15da45c207ae5bf09fa025cfc96a994a4acc9e8f9f649712590fbbc0cab501152ef9869221eac649301ac90fd9bb18ebdaf18980288223f16919b460bb0755bdae0a69c05ca5f3be5de8ba51ae3e0507c74d0b6f2d98c5dd60bc071c859adb5d2497a41681ee014f95189da2c6524bc83c7968e58ddb503f8e30eef96c76b74bad63c312f2ecae057f2004a9b8b941cd67d5c71777f68a9675e381bddc31f8bfbc2f619b744f2a5b0b0585f53ee9f87b41eb32c278040a1cf8b428fd1cab681888372b9a37f738e7b0f28e3dc1298a81a1088c6916bbe045a22dced5231f935979ee71546b153adf0090d7a4b202c48bb850c4eb3d63d43f79e94f275b5cb4c6cced0ca64c33db39ca348fe017f38a33fd99a7ee2c89823f868d8dc84fe68146733b4f14002b2d379721da67ff4c7d94e8f56f267475ab3cd1ab5400a97c672fc569fbb3bd5d533368a9efe35fcf8258cd95f1949c62e9b724ffdbe070f1b167da3970c20886d1709d41a9288a9d1efa20e4364e9c143e759cd4fce9b6dacca0a2df706fde5fb4a5efcdea199d416cbe16b358e0cb207f95a40d06643e0285c26eb578bb19017e96f97e837d95fdecc4d415d141ec5ed733c772d6786aa0d352c380798fca6cd205b6dcb185922fe18d98ee6f75ae96ebffb4ddfb0aee18de9c9335232dbd50a6db8e0b7e8a752d9132e23109f743d04a0d228157979be47c54b1bcd701ecc64b99f1fba5195de1c9e91ed8172f98c44e01c2d9b75b1721ad76bd1d82c3663c0167e5f74379ad2ad0550b161a104cb57ac1716b5a80fc71d03ba1d9f9759f267a071acd4acf1dd93b1cc6eaf52da80d6ffe461406c053d4dd982313580932f85389574abfa54b1a3c0c2468b90036afa93a70490273dd8ba24df3a7865829526d6e9055e4c694cfb6a7922c6fa8f1f2511", 0x1000}, {&(0x7f0000001800)="e9520f2ff1ab88083a596ceeecd7e6e6ea4a2430a4d0f6a14a643deeeef43009b1918714b115c782c632fed9e7c5c65159cdab6791fcc2c66076b1a9c5036a5d61df", 0x42}], 0x7, &(0x7f0000001900)=ANY=[@ANYBLOB="500000000000000013010000eb0500004ae9f6fc26a4c9b2447f72cbf0fb95acc7ded5d625fe48f5f15f6d3345e2af8b1b4c60a42203a724f26c1bbf0000000000800000000000000003010000a700000097f5671b395a4cc7699408450f0e000000000000b5249000c83b106ab24dd889c66c526d96365f3f059f4962bd2aff7f9d391416183472a22c5f41ec3de18db31db018482c537ea06e5030f8bdc60bf37737cb92b53d7305c4ab0f1b04b209b4352cdfadfd49f3f19f4669e43000000000000090000000000000000100000000040000f877e64a34bccb0ba13e018807613cd5a4eefa663aae486703c2d3d154f7c20fc2915a6377b6bf592c6b8775e632b51494ecc7797572bef4c9c34671fc07c2e10cf636f68f782424a5ccc82d1e24078262db5c639e254ebfb15659c92def0ab328d5f58a932c1634395c8dd1d91f2b7d920e13764d7115a2e8329ad651"], 0x160}}, {{&(0x7f0000001a80)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001b00)="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", 0xfb}], 0x1, &(0x7f0000002140)=[{0x88, 0x3a, 0x4, "dbce45d25450f21e2127d727de13a54a310158799b0a0d02d9b7bf152d10f786efbbf8177e5ca67dbba1c90b4976f8340622040ce35a3d4b28e98d0595b82e84728187247fbf9425029fbc1ae896b0b62a5bcf3bfd41f6f5e1dbe2247c2c2bdc0e800beb674e84fd6b940f3217791bbb36f5"}, {0xd0, 0x6, 0x8000, "3f0eaef570776029a08582d1b61905641c1dd23b96c1d7d49d18d361d405610b2618c8b766a81a742c9e8abc6a416ac0a76252041d1e3c8b1e176c8b4ba13d6e7e7d442ef9bba5087286bfbc37c71f52fa7bb1a83a21b347a27e60873f1856ccafdb67133a3b50d61fb2dde6e73f7931e1a5bf1dd4c0fb02200581e241986eb37a699fd930edc63efcbf917ff34c466440f5a8d25dbef778f5bee74e46fb2e617681a6959f7ec85bbb635ca2e5ae1fe139cc7b7a4f242eb296030a8d7be936c7"}, {0xf8, 0x29, 0x1000, "6956a6a6b437328ce6c15788ba963363ccd327b78c6e10408fb4a436696935843d021f6d6f1ff6512843551d25bfe3c18d5aa3e217257946f54206e76a1ec50c6ddef2b51774352d512b646239d325ddc907b843072ed1d951e320631e8393dca4a5e376b0121b6e7a7d65708c6934751ebfcb252e61398a0c89469058a4ea8009054202bab7c3bb0f852115742b09651f6f84fc39f830e6cdf20fb4d2d7ffe747dced3e9ba97b053a373023ce26dfaa4be33bcc67e110d5a52ab234c1cf062f2e11d1821378a362bd1f824a2e54a2fd03cb4f4b2f9efb0eba99bf24d7f4f69e683d051cce2381"}, {0xe0, 0x115, 0x10001, "3346f32985b7f818c7ac035e70461bcfb39f67c1c384baa93c1afe782c6ceb8ba5188f05785f3b1149a7dbbe0a8aaae6cd02bd6f69b92bbfb2394220f59a6a1216f35fdbef69a79ffc9ae161adccd7d09b161e477e53d99c4333920852120297213a8af6bd51d1eaf9883b72e2f7b19e69fa328aa1154e251659005e760120d20e52bf93275ae2cbea6df7fd44a83638e7e06456219c9ebcda3692c1f3f4c6c6811169ac343270aec29af7fcbf7f25d4a1190c34c7a7a4c6accda639d4eca8e714576360e1ae55ab5dc259e24aeb"}, {0xc8, 0x84, 0x9, "d04b2d5a51d16c7f4fff58a69c1d6228f5d1ed10d9c5231e4ac6e147352f6de061a2377c36b6bf09b5f73637bb6feee6ba6b43b8dee3d438b0d90611fe45b2fa38cc2ee59f08b4ce491d3e40f1b04af8a5fbac7e6b79b250cb9ac061633657b306088e290506b90b5c4ea9520fe781877b1596e505a3b94c4be36fda2a13975936ffa46edd96039fd9a25e9bb7f394a88ec51b7a71a9b9a84b586c17dd7ea859a48fbb9e3fb51f692ad70b721955b9858e7f8f859b78"}, {0x110, 0x3a, 0x2, "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"}, {0x48, 0x116, 0x266, "7b630aab99d30cfe866370e7306e54d8fe2500e6b9b9004eb1316908b668ed04e9cf4a905a2308a2cc7865a1630d598cfbd4cfdf61e68fd7"}], 0x550}}, {{&(0x7f0000001c00)=@ll={0x11, 0x2, r3, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001c80)="71995ef5bf3aea751d898dd4170d3ac0fcaa636cf40ac8bac8c0663ca94f71f3b0422cf4386937152e0affd95ff9f13a0f3bf4252fe88439c398247f45f5bd75681c12d8f28a64bc0d58ebdbc6d7bf04752430250241ea5741c8c28e6a29d15835e88bcb8acb4a05776041fcd7d167712731e7737509bdc8eb9524c1ce379a1df9206d22c69c2a4dc78761d646", 0x8d}, {&(0x7f0000001d40)="99dd596e3cb913d90c6ba3438d4b8097a4f9f4b76306f935fa7f1c5c36e490b2e6fe26c8b25861dbf44af9b70e46e0dbcb223d0edf7508d9e0227536ab2d551a27d99b9a43782bb139d9f9f66782d719757b3d85b4c90600eb6475c80665ffd518360eaa36b9ee75d4e779", 0x6b}, {&(0x7f0000001dc0)="b4e6ef7b29b9faf5e294b2e0961e9c24a7a430666ca4eb071017c159f4917278d529dc26961370dac2121aae8f95193df314f2b767d304102f1395416ddcc03fc73271412390aeed49ab83f5afeb7ad3cf7326a384ff0c943628b00605b538727add8d734c41f8f5b20bb78efbb972c47b4b9a062135409549085020f4934c9568f10b0a68f65625328f0bec35be2757b8ae09e2298fe94c1d5c1fc1b3e1615b315ddeec9c51248189a2e75263edcc9dd6b35dd51981f0d3bceb9b87", 0xbc}, {&(0x7f0000001e80)="617f60a0096e987e906a1c24c5986c3cfac599da88bff9cb92bf55e6fc99c4633f5c5bd65ab980e916b7d358226fb31d933c40ddfd06bcd26be69274323b249f9d597ac1cc55c38db5c51ff76a8a1b96542d2e1639cd8d485228ae79b3784a88975cb0dcb1f9", 0x66}, {&(0x7f0000001f00)="402d1236f2555887ec08b78e518a4a6efb52514a78daeb0954e9fe94e863702d109dec6c120aafea020cd7c52b536680a96aec010869b0f361410d84984339f60954b13eda1cc373327787f0df404cc1b07acb1dcba508e3b72c8dc6fb5a9e77ab77124ff9538c3ed0782cff3098deda5ff5272f6b7bb4e5cd20ca1bbb1b194d092ab50b9c7ab82160a7810f119e920fd9cb6aaae0ce169df50c9be8a1a34d3ad8", 0xa1}], 0x5, &(0x7f00000026c0)=[{0xf8, 0x114, 0x7, "a13c5955b1498767a4d718beba47ab8695f5e086dc48d3df7de9aaf53830c8f53afdefc33efb66fcff9d2be13ad2b56ac2cba1e112918f710930503f79e894071cee91b969f02299617630f8505448ac03502b09d0eee92478deb1848a774c3d060c5279070c2d5ad730a06284f5130654506fe7b6c6127f40ebde6d200d3e1f1c5ea2e485652ecbc664d0f187007e254949155c4b821fa58d589891a77929844b4a0dcbada6d04d94989c0e9d1d04501a0ed4ca295ab3e5e3fbf8aae3f599ff6bce8b40b8802cba93537141b94f90de862886e3ebd71ae54e8358f3c44f1bc7af5076"}, {0x30, 0x10b, 0x2, "cd510a94451a905a6663539292e99013bd1de239964229544070"}, {0x20, 0x118, 0x2, "d4cb6442e708aebe5c"}], 0x148}}], 0x3, 0x4010) 14:27:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008002d2) 14:27:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2b00, 0x0, 0x0, 0x600000}) [ 238.871786][T20625] FAULT_INJECTION: forcing a failure. [ 238.871786][T20625] name failslab, interval 1, probability 0, space 0, times 0 [ 238.884455][T20625] CPU: 0 PID: 20625 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 238.894885][T20625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 238.904951][T20625] Call Trace: [ 238.908236][T20625] [ 238.911171][T20625] dump_stack_lvl+0xda/0x130 [ 238.915785][T20625] dump_stack+0x15/0x20 14:27:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2b01, 0x0, 0x0, 0x600000}) [ 238.919980][T20625] should_fail_ex+0x21f/0x230 [ 238.924756][T20625] ? ext4_htree_store_dirent+0x5d/0x290 [ 238.930323][T20625] __should_failslab+0x92/0xa0 [ 238.935144][T20625] should_failslab+0x9/0x20 [ 238.939685][T20625] __kmem_cache_alloc_node+0x4e/0x210 [ 238.945121][T20625] ? ext4_htree_store_dirent+0x5d/0x290 [ 238.950778][T20625] __kmalloc+0x95/0x1a0 [ 238.954998][T20625] ext4_htree_store_dirent+0x5d/0x290 [ 238.960390][T20625] htree_dirblock_to_tree+0x4c3/0x630 [ 238.965833][T20625] ext4_htree_fill_tree+0x429/0x9b0 14:27:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2c00, 0x0, 0x0, 0x600000}) [ 238.971072][T20625] ? _raw_spin_unlock+0x26/0x40 [ 238.975934][T20625] ? __find_get_block+0x5d2/0x890 [ 238.980971][T20625] ? slab_post_alloc_hook+0x82/0x2f0 [ 238.985132][T20643] ipvlan15: entered promiscuous mode [ 238.986258][T20625] ? ext4_readdir+0x2b3/0x1ac0 [ 238.993449][T20643] bridge0: port 2(ipvlan15) entered blocking state [ 238.996286][T20625] ext4_readdir+0x15b0/0x1ac0 [ 239.002877][T20643] bridge0: port 2(ipvlan15) entered disabled state [ 239.007448][T20625] ? down_read_killable+0x170/0x6b0 [ 239.014368][T20643] ipvlan15: entered allmulticast mode [ 239.019255][T20625] ? fsnotify_perm+0x360/0x380 [ 239.019288][T20625] iterate_dir+0x128/0x300 [ 239.024631][T20643] bridge0: entered allmulticast mode [ 239.029374][T20625] exportfs_get_name+0x230/0x2a0 [ 239.036947][T20643] ipvlan15: left allmulticast mode [ 239.039072][T20625] ? exportfs_decode_fh+0x70/0x70 [ 239.039102][T20625] reconnect_path+0x158/0x3e0 [ 239.039123][T20625] exportfs_decode_fh_raw+0x184/0x400 [ 239.039142][T20625] ? do_handle_open+0x3d0/0x3d0 [ 239.039205][T20625] ? do_handle_open+0x3d0/0x3d0 [ 239.044125][T20643] bridge0: left allmulticast mode [ 239.049194][T20625] exportfs_decode_fh+0x3c/0x70 [ 239.049241][T20625] do_handle_open+0x2df/0x3d0 [ 239.088571][T20625] __x64_sys_open_by_handle_at+0x46/0x50 [ 239.094238][T20625] do_syscall_64+0x44/0x110 [ 239.098810][T20625] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 239.104709][T20625] RIP: 0033:0x7fbc0d2a7ce9 [ 239.109210][T20625] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 239.128825][T20625] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 239.137335][T20625] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 239.145323][T20625] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 239.153365][T20625] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 239.161323][T20625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:43 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:43 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 28) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2c01, 0x0, 0x0, 0x600000}) [ 239.169372][T20625] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 239.177373][T20625] 14:27:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0xe4a5, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0xe0, &(0x7f0000000d00)={&(0x7f0000000600)=ANY=[@ANYBLOB="2c020000", @ANYRES16, @ANYBLOB="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", @ANYRES32=r3], 0x22c}}, 0x0) (async) preadv(r1, &(0x7f0000004d40)=[{&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/230, 0xe6}, {&(0x7f0000003940)=""/4096, 0x1000}, {&(0x7f0000004940)=""/241, 0xf1}, {&(0x7f0000004a40)=""/29, 0x1d}, {&(0x7f0000004a80)=""/160, 0xa0}, {&(0x7f0000004b40)=""/209, 0xd1}, {&(0x7f0000004c40)=""/226, 0xe2}], 0x8, 0x60, 0x4) (async) sendmmsg(r2, &(0x7f0000002040)=[{{&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0xffffffff, @private1={0xfc, 0x1, '\x00', 0x1}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000380)="5ae0f3ea19c8e65e753e256fc82a84cc6c70acfe854fe84272ec8c0ae551c196e09ced1912dedb4e9ebe4f729aa0c3c6d8a4b2cda8591386d3f749fa2c7a8c4d8ad1b608f9b05acfca0f05b9393625a1c7305d8e3bc5cf225112253781c880ac17a66a65511b2a884d7f603603d9d484278ca62808135d37dc896499780f5641ee1e0be6d52e7cac1737d2f37b58911eb97353d9ded1559c25e1386ccd174850579249aca1d6667aa3a3eee076730f434e6ae1476f2f8161f9", 0xb9}, {&(0x7f00000004c0)="38ab5a2baaa9de554a5615b9d221d8e381562850ef6fbb7855a4a462dc75c9e36bba5bb9fc5a1d20b1476840b7c45bd0d1b091d554f599b15a630481dde8a23d3ff34b6acc5ef7728772e2171334751e1d896f24809baa075a7d2a9def59645a5d5d4301f3ffdb5ccea5ab66d05403c96320b0ff467fb5e49d2b5840b884617248292f4b80eb3c965b5e387c2feb01ca392229753410b36bfe4cac36d009028ad71e37b023b381278b5c7bd2ba7564763f3a610a903f466a4ebbdbccb4706dc772", 0xc1}, {&(0x7f0000000080)="fc78a31db7a144d6d71b6ccd2a6f081b9eb8af769cb9faea36fb70c599facb91e5314d8b8b007461db78834e034bc0acbecd0b86c33d1ee6", 0x38}, {&(0x7f0000000600)="5b21187347b56df4f9a8a8ba794694cbddfac23f9c56a2d6f8b360c639e22eb7f4b9f16300239b7b0247a2c3e0de160d0ebd3073fbad85f5b406440656d463875faf3eae600ce307353b6465d61718a9be991b40a2c162e487a101651b05a8baf06d4e83414af7b4e2016b3375530e89bbb9842db8611f99ee632e6ff54ec4886adf388bf5f28f51b751dba3af137b05ea8f81645664c0cee37f7eb14829f1563aa2c1db835628fbcc34e4aa2175f679cab55ceba320d0b10776739fedbe467f4ac701d041a77e595949290a7a8b04e2086736fc7eddaf464b76ca2717ce20159947b6bd93ec55c0a827f689c5fa3b", 0xef}, {&(0x7f0000000700)="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", 0xfb}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="e9520f2ff1ab88083a596ceeecd7e6e6ea4a2430a4d0f6a14a643deeeef43009b1918714b115c782c632fed9e7c5c65159cdab6791fcc2c66076b1a9c5036a5d61df", 0x42}], 0x7, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], 0x160}}, {{&(0x7f0000001a80)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001b00)="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", 0xfb}], 0x1, &(0x7f0000002140)=[{0x88, 0x3a, 0x4, "dbce45d25450f21e2127d727de13a54a310158799b0a0d02d9b7bf152d10f786efbbf8177e5ca67dbba1c90b4976f8340622040ce35a3d4b28e98d0595b82e84728187247fbf9425029fbc1ae896b0b62a5bcf3bfd41f6f5e1dbe2247c2c2bdc0e800beb674e84fd6b940f3217791bbb36f5"}, {0xd0, 0x6, 0x8000, "3f0eaef570776029a08582d1b61905641c1dd23b96c1d7d49d18d361d405610b2618c8b766a81a742c9e8abc6a416ac0a76252041d1e3c8b1e176c8b4ba13d6e7e7d442ef9bba5087286bfbc37c71f52fa7bb1a83a21b347a27e60873f1856ccafdb67133a3b50d61fb2dde6e73f7931e1a5bf1dd4c0fb02200581e241986eb37a699fd930edc63efcbf917ff34c466440f5a8d25dbef778f5bee74e46fb2e617681a6959f7ec85bbb635ca2e5ae1fe139cc7b7a4f242eb296030a8d7be936c7"}, {0xf8, 0x29, 0x1000, "6956a6a6b437328ce6c15788ba963363ccd327b78c6e10408fb4a436696935843d021f6d6f1ff6512843551d25bfe3c18d5aa3e217257946f54206e76a1ec50c6ddef2b51774352d512b646239d325ddc907b843072ed1d951e320631e8393dca4a5e376b0121b6e7a7d65708c6934751ebfcb252e61398a0c89469058a4ea8009054202bab7c3bb0f852115742b09651f6f84fc39f830e6cdf20fb4d2d7ffe747dced3e9ba97b053a373023ce26dfaa4be33bcc67e110d5a52ab234c1cf062f2e11d1821378a362bd1f824a2e54a2fd03cb4f4b2f9efb0eba99bf24d7f4f69e683d051cce2381"}, {0xe0, 0x115, 0x10001, "3346f32985b7f818c7ac035e70461bcfb39f67c1c384baa93c1afe782c6ceb8ba5188f05785f3b1149a7dbbe0a8aaae6cd02bd6f69b92bbfb2394220f59a6a1216f35fdbef69a79ffc9ae161adccd7d09b161e477e53d99c4333920852120297213a8af6bd51d1eaf9883b72e2f7b19e69fa328aa1154e251659005e760120d20e52bf93275ae2cbea6df7fd44a83638e7e06456219c9ebcda3692c1f3f4c6c6811169ac343270aec29af7fcbf7f25d4a1190c34c7a7a4c6accda639d4eca8e714576360e1ae55ab5dc259e24aeb"}, {0xc8, 0x84, 0x9, "d04b2d5a51d16c7f4fff58a69c1d6228f5d1ed10d9c5231e4ac6e147352f6de061a2377c36b6bf09b5f73637bb6feee6ba6b43b8dee3d438b0d90611fe45b2fa38cc2ee59f08b4ce491d3e40f1b04af8a5fbac7e6b79b250cb9ac061633657b306088e290506b90b5c4ea9520fe781877b1596e505a3b94c4be36fda2a13975936ffa46edd96039fd9a25e9bb7f394a88ec51b7a71a9b9a84b586c17dd7ea859a48fbb9e3fb51f692ad70b721955b9858e7f8f859b78"}, {0x110, 0x3a, 0x2, "f1aa51b98b9f4b19500c5aaa4c63a38626f8fb9f2ed1e77bdef64797fe6097d2e795c0d4c6c73869dbcfebe685aac808e5306083de7ad01e982772d1db5e14c638c6f7ce010ab7dbd3446844f2b73a720e7536ad6457136f3a07c314b5213e789d20da533048491f5843f7c714273f21b339a21ec312a4fea55e733c72f3a012b5e04bee03c21ea0a091eadbb728f8e6bb07d35e14b0d936e2c2c1a0fe10329526fa9ea98137c8fd806a95ce1cfdf67b8afbff2c92420cd5da80cfdcf01e823aec4c0c3a400d72ed923e0df491232c5f06395d14b4f966b73e40632120719cd0c28c3e47e65d345ec1db5ee577188ff200804ec629e99bec6be847742c4514"}, {0x48, 0x116, 0x266, "7b630aab99d30cfe866370e7306e54d8fe2500e6b9b9004eb1316908b668ed04e9cf4a905a2308a2cc7865a1630d598cfbd4cfdf61e68fd7"}], 0x550}}, {{&(0x7f0000001c00)=@ll={0x11, 0x2, r3, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001c80)="71995ef5bf3aea751d898dd4170d3ac0fcaa636cf40ac8bac8c0663ca94f71f3b0422cf4386937152e0affd95ff9f13a0f3bf4252fe88439c398247f45f5bd75681c12d8f28a64bc0d58ebdbc6d7bf04752430250241ea5741c8c28e6a29d15835e88bcb8acb4a05776041fcd7d167712731e7737509bdc8eb9524c1ce379a1df9206d22c69c2a4dc78761d646", 0x8d}, {&(0x7f0000001d40)="99dd596e3cb913d90c6ba3438d4b8097a4f9f4b76306f935fa7f1c5c36e490b2e6fe26c8b25861dbf44af9b70e46e0dbcb223d0edf7508d9e0227536ab2d551a27d99b9a43782bb139d9f9f66782d719757b3d85b4c90600eb6475c80665ffd518360eaa36b9ee75d4e779", 0x6b}, {&(0x7f0000001dc0)="b4e6ef7b29b9faf5e294b2e0961e9c24a7a430666ca4eb071017c159f4917278d529dc26961370dac2121aae8f95193df314f2b767d304102f1395416ddcc03fc73271412390aeed49ab83f5afeb7ad3cf7326a384ff0c943628b00605b538727add8d734c41f8f5b20bb78efbb972c47b4b9a062135409549085020f4934c9568f10b0a68f65625328f0bec35be2757b8ae09e2298fe94c1d5c1fc1b3e1615b315ddeec9c51248189a2e75263edcc9dd6b35dd51981f0d3bceb9b87", 0xbc}, {&(0x7f0000001e80)="617f60a0096e987e906a1c24c5986c3cfac599da88bff9cb92bf55e6fc99c4633f5c5bd65ab980e916b7d358226fb31d933c40ddfd06bcd26be69274323b249f9d597ac1cc55c38db5c51ff76a8a1b96542d2e1639cd8d485228ae79b3784a88975cb0dcb1f9", 0x66}, {&(0x7f0000001f00)="402d1236f2555887ec08b78e518a4a6efb52514a78daeb0954e9fe94e863702d109dec6c120aafea020cd7c52b536680a96aec010869b0f361410d84984339f60954b13eda1cc373327787f0df404cc1b07acb1dcba508e3b72c8dc6fb5a9e77ab77124ff9538c3ed0782cff3098deda5ff5272f6b7bb4e5cd20ca1bbb1b194d092ab50b9c7ab82160a7810f119e920fd9cb6aaae0ce169df50c9be8a1a34d3ad8", 0xa1}], 0x5, &(0x7f00000026c0)=[{0xf8, 0x114, 0x7, "a13c5955b1498767a4d718beba47ab8695f5e086dc48d3df7de9aaf53830c8f53afdefc33efb66fcff9d2be13ad2b56ac2cba1e112918f710930503f79e894071cee91b969f02299617630f8505448ac03502b09d0eee92478deb1848a774c3d060c5279070c2d5ad730a06284f5130654506fe7b6c6127f40ebde6d200d3e1f1c5ea2e485652ecbc664d0f187007e254949155c4b821fa58d589891a77929844b4a0dcbada6d04d94989c0e9d1d04501a0ed4ca295ab3e5e3fbf8aae3f599ff6bce8b40b8802cba93537141b94f90de862886e3ebd71ae54e8358f3c44f1bc7af5076"}, {0x30, 0x10b, 0x2, "cd510a94451a905a6663539292e99013bd1de239964229544070"}, {0x20, 0x118, 0x2, "d4cb6442e708aebe5c"}], 0x148}}], 0x3, 0x4010) 14:27:43 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 239.220245][T20653] ipvlan22: entered promiscuous mode [ 239.256998][T20654] FAULT_INJECTION: forcing a failure. [ 239.256998][T20654] name failslab, interval 1, probability 0, space 0, times 0 [ 239.269307][T20667] ipvlan15: entered promiscuous mode [ 239.269651][T20654] CPU: 0 PID: 20654 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 239.276645][T20667] bridge0: port 2(ipvlan15) entered blocking state [ 239.285254][T20654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 239.285268][T20654] Call Trace: [ 239.292049][T20667] bridge0: port 2(ipvlan15) entered disabled state [ 239.301970][T20654] [ 239.301978][T20654] dump_stack_lvl+0xda/0x130 [ 239.306988][T20667] ipvlan15: entered allmulticast mode [ 239.311753][T20654] dump_stack+0x15/0x20 [ 239.314715][T20667] bridge0: entered allmulticast mode [ 239.319281][T20654] should_fail_ex+0x21f/0x230 [ 239.338933][T20654] ? ext4_htree_store_dirent+0x5d/0x290 [ 239.344531][T20654] __should_failslab+0x92/0xa0 [ 239.346775][T20667] ipvlan15: left allmulticast mode 14:27:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async, rerun: 32) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 32) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0xe4a5, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0xe0, &(0x7f0000000d00)={&(0x7f0000000600)=ANY=[@ANYBLOB="2c020000", @ANYRES16, @ANYBLOB="010000000000000000000100000024000300a05ca84f6c9c8e3853e2fd7a70ae0fb20fa152600cb00845174f08076f8d7843e4010880440000802400010000000000010000000000000000000002000000000000000000000000000000001400040002000000ac1414bb00000000000000000600050000000000000100802400020073e591ec06154031d3954ac0e16752e72640f08b5281a8461d17d26d12f2bbb6060005000021000024000100f44da367a88ee6564f020211456727082f5cebee8b1bf5eb7337341b459b39228c00098028000080060001000a0000001400020020010000000000000000000000000001050003000000000088000080060001000a0000001400020020010000000000000000000000000002050003000000000003800080060001008c0e000008000200ac1414aa05000300000000001c000080060001000200000008000200ac1414bb0500030000000000200004000a00000000000000fe800000000000000000000000000000000000009c0000802400020073961633df6dc9cb418b15afd0bae7b90f1e6cfed8bb423cf9285c474163154908000a00010000002400010000000000000000000000000000000000000000000000000000000000000000004800098028000080060001000a00000014000200fe8000000000000000000000000000bb05000300000000001c000080060001000200000008000200000000000500030000000000080005000100000008000100", @ANYRES32=r3], 0x22c}}, 0x0) (async) preadv(r1, &(0x7f0000004d40)=[{&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/230, 0xe6}, {&(0x7f0000003940)=""/4096, 0x1000}, {&(0x7f0000004940)=""/241, 0xf1}, {&(0x7f0000004a40)=""/29, 0x1d}, {&(0x7f0000004a80)=""/160, 0xa0}, {&(0x7f0000004b40)=""/209, 0xd1}, {&(0x7f0000004c40)=""/226, 0xe2}], 0x8, 0x60, 0x4) (async) sendmmsg(r2, &(0x7f0000002040)=[{{&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0xffffffff, @private1={0xfc, 0x1, '\x00', 0x1}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000380)="5ae0f3ea19c8e65e753e256fc82a84cc6c70acfe854fe84272ec8c0ae551c196e09ced1912dedb4e9ebe4f729aa0c3c6d8a4b2cda8591386d3f749fa2c7a8c4d8ad1b608f9b05acfca0f05b9393625a1c7305d8e3bc5cf225112253781c880ac17a66a65511b2a884d7f603603d9d484278ca62808135d37dc896499780f5641ee1e0be6d52e7cac1737d2f37b58911eb97353d9ded1559c25e1386ccd174850579249aca1d6667aa3a3eee076730f434e6ae1476f2f8161f9", 0xb9}, {&(0x7f00000004c0)="38ab5a2baaa9de554a5615b9d221d8e381562850ef6fbb7855a4a462dc75c9e36bba5bb9fc5a1d20b1476840b7c45bd0d1b091d554f599b15a630481dde8a23d3ff34b6acc5ef7728772e2171334751e1d896f24809baa075a7d2a9def59645a5d5d4301f3ffdb5ccea5ab66d05403c96320b0ff467fb5e49d2b5840b884617248292f4b80eb3c965b5e387c2feb01ca392229753410b36bfe4cac36d009028ad71e37b023b381278b5c7bd2ba7564763f3a610a903f466a4ebbdbccb4706dc772", 0xc1}, {&(0x7f0000000080)="fc78a31db7a144d6d71b6ccd2a6f081b9eb8af769cb9faea36fb70c599facb91e5314d8b8b007461db78834e034bc0acbecd0b86c33d1ee6", 0x38}, {&(0x7f0000000600)="5b21187347b56df4f9a8a8ba794694cbddfac23f9c56a2d6f8b360c639e22eb7f4b9f16300239b7b0247a2c3e0de160d0ebd3073fbad85f5b406440656d463875faf3eae600ce307353b6465d61718a9be991b40a2c162e487a101651b05a8baf06d4e83414af7b4e2016b3375530e89bbb9842db8611f99ee632e6ff54ec4886adf388bf5f28f51b751dba3af137b05ea8f81645664c0cee37f7eb14829f1563aa2c1db835628fbcc34e4aa2175f679cab55ceba320d0b10776739fedbe467f4ac701d041a77e595949290a7a8b04e2086736fc7eddaf464b76ca2717ce20159947b6bd93ec55c0a827f689c5fa3b", 0xef}, {&(0x7f0000000700)="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", 0xfb}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="e9520f2ff1ab88083a596ceeecd7e6e6ea4a2430a4d0f6a14a643deeeef43009b1918714b115c782c632fed9e7c5c65159cdab6791fcc2c66076b1a9c5036a5d61df", 0x42}], 0x7, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], 0x160}}, {{&(0x7f0000001a80)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001b00)="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", 0xfb}], 0x1, &(0x7f0000002140)=[{0x88, 0x3a, 0x4, "dbce45d25450f21e2127d727de13a54a310158799b0a0d02d9b7bf152d10f786efbbf8177e5ca67dbba1c90b4976f8340622040ce35a3d4b28e98d0595b82e84728187247fbf9425029fbc1ae896b0b62a5bcf3bfd41f6f5e1dbe2247c2c2bdc0e800beb674e84fd6b940f3217791bbb36f5"}, {0xd0, 0x6, 0x8000, "3f0eaef570776029a08582d1b61905641c1dd23b96c1d7d49d18d361d405610b2618c8b766a81a742c9e8abc6a416ac0a76252041d1e3c8b1e176c8b4ba13d6e7e7d442ef9bba5087286bfbc37c71f52fa7bb1a83a21b347a27e60873f1856ccafdb67133a3b50d61fb2dde6e73f7931e1a5bf1dd4c0fb02200581e241986eb37a699fd930edc63efcbf917ff34c466440f5a8d25dbef778f5bee74e46fb2e617681a6959f7ec85bbb635ca2e5ae1fe139cc7b7a4f242eb296030a8d7be936c7"}, {0xf8, 0x29, 0x1000, "6956a6a6b437328ce6c15788ba963363ccd327b78c6e10408fb4a436696935843d021f6d6f1ff6512843551d25bfe3c18d5aa3e217257946f54206e76a1ec50c6ddef2b51774352d512b646239d325ddc907b843072ed1d951e320631e8393dca4a5e376b0121b6e7a7d65708c6934751ebfcb252e61398a0c89469058a4ea8009054202bab7c3bb0f852115742b09651f6f84fc39f830e6cdf20fb4d2d7ffe747dced3e9ba97b053a373023ce26dfaa4be33bcc67e110d5a52ab234c1cf062f2e11d1821378a362bd1f824a2e54a2fd03cb4f4b2f9efb0eba99bf24d7f4f69e683d051cce2381"}, {0xe0, 0x115, 0x10001, "3346f32985b7f818c7ac035e70461bcfb39f67c1c384baa93c1afe782c6ceb8ba5188f05785f3b1149a7dbbe0a8aaae6cd02bd6f69b92bbfb2394220f59a6a1216f35fdbef69a79ffc9ae161adccd7d09b161e477e53d99c4333920852120297213a8af6bd51d1eaf9883b72e2f7b19e69fa328aa1154e251659005e760120d20e52bf93275ae2cbea6df7fd44a83638e7e06456219c9ebcda3692c1f3f4c6c6811169ac343270aec29af7fcbf7f25d4a1190c34c7a7a4c6accda639d4eca8e714576360e1ae55ab5dc259e24aeb"}, {0xc8, 0x84, 0x9, "d04b2d5a51d16c7f4fff58a69c1d6228f5d1ed10d9c5231e4ac6e147352f6de061a2377c36b6bf09b5f73637bb6feee6ba6b43b8dee3d438b0d90611fe45b2fa38cc2ee59f08b4ce491d3e40f1b04af8a5fbac7e6b79b250cb9ac061633657b306088e290506b90b5c4ea9520fe781877b1596e505a3b94c4be36fda2a13975936ffa46edd96039fd9a25e9bb7f394a88ec51b7a71a9b9a84b586c17dd7ea859a48fbb9e3fb51f692ad70b721955b9858e7f8f859b78"}, {0x110, 0x3a, 0x2, "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"}, {0x48, 0x116, 0x266, "7b630aab99d30cfe866370e7306e54d8fe2500e6b9b9004eb1316908b668ed04e9cf4a905a2308a2cc7865a1630d598cfbd4cfdf61e68fd7"}], 0x550}}, {{&(0x7f0000001c00)=@ll={0x11, 0x2, r3, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001c80)="71995ef5bf3aea751d898dd4170d3ac0fcaa636cf40ac8bac8c0663ca94f71f3b0422cf4386937152e0affd95ff9f13a0f3bf4252fe88439c398247f45f5bd75681c12d8f28a64bc0d58ebdbc6d7bf04752430250241ea5741c8c28e6a29d15835e88bcb8acb4a05776041fcd7d167712731e7737509bdc8eb9524c1ce379a1df9206d22c69c2a4dc78761d646", 0x8d}, {&(0x7f0000001d40)="99dd596e3cb913d90c6ba3438d4b8097a4f9f4b76306f935fa7f1c5c36e490b2e6fe26c8b25861dbf44af9b70e46e0dbcb223d0edf7508d9e0227536ab2d551a27d99b9a43782bb139d9f9f66782d719757b3d85b4c90600eb6475c80665ffd518360eaa36b9ee75d4e779", 0x6b}, {&(0x7f0000001dc0)="b4e6ef7b29b9faf5e294b2e0961e9c24a7a430666ca4eb071017c159f4917278d529dc26961370dac2121aae8f95193df314f2b767d304102f1395416ddcc03fc73271412390aeed49ab83f5afeb7ad3cf7326a384ff0c943628b00605b538727add8d734c41f8f5b20bb78efbb972c47b4b9a062135409549085020f4934c9568f10b0a68f65625328f0bec35be2757b8ae09e2298fe94c1d5c1fc1b3e1615b315ddeec9c51248189a2e75263edcc9dd6b35dd51981f0d3bceb9b87", 0xbc}, {&(0x7f0000001e80)="617f60a0096e987e906a1c24c5986c3cfac599da88bff9cb92bf55e6fc99c4633f5c5bd65ab980e916b7d358226fb31d933c40ddfd06bcd26be69274323b249f9d597ac1cc55c38db5c51ff76a8a1b96542d2e1639cd8d485228ae79b3784a88975cb0dcb1f9", 0x66}, {&(0x7f0000001f00)="402d1236f2555887ec08b78e518a4a6efb52514a78daeb0954e9fe94e863702d109dec6c120aafea020cd7c52b536680a96aec010869b0f361410d84984339f60954b13eda1cc373327787f0df404cc1b07acb1dcba508e3b72c8dc6fb5a9e77ab77124ff9538c3ed0782cff3098deda5ff5272f6b7bb4e5cd20ca1bbb1b194d092ab50b9c7ab82160a7810f119e920fd9cb6aaae0ce169df50c9be8a1a34d3ad8", 0xa1}], 0x5, &(0x7f00000026c0)=[{0xf8, 0x114, 0x7, "a13c5955b1498767a4d718beba47ab8695f5e086dc48d3df7de9aaf53830c8f53afdefc33efb66fcff9d2be13ad2b56ac2cba1e112918f710930503f79e894071cee91b969f02299617630f8505448ac03502b09d0eee92478deb1848a774c3d060c5279070c2d5ad730a06284f5130654506fe7b6c6127f40ebde6d200d3e1f1c5ea2e485652ecbc664d0f187007e254949155c4b821fa58d589891a77929844b4a0dcbada6d04d94989c0e9d1d04501a0ed4ca295ab3e5e3fbf8aae3f599ff6bce8b40b8802cba93537141b94f90de862886e3ebd71ae54e8358f3c44f1bc7af5076"}, {0x30, 0x10b, 0x2, "cd510a94451a905a6663539292e99013bd1de239964229544070"}, {0x20, 0x118, 0x2, "d4cb6442e708aebe5c"}], 0x148}}], 0x3, 0x4010) 14:27:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008002d6) [ 239.349305][T20654] should_failslab+0x9/0x20 [ 239.349340][T20654] __kmem_cache_alloc_node+0x4e/0x210 [ 239.354472][T20667] bridge0: left allmulticast mode [ 239.358968][T20654] ? ext4_htree_store_dirent+0x5d/0x290 [ 239.358993][T20654] __kmalloc+0x95/0x1a0 [ 239.359028][T20654] ext4_htree_store_dirent+0x5d/0x290 [ 239.384465][T20654] htree_dirblock_to_tree+0x4c3/0x630 [ 239.389936][T20654] ext4_htree_fill_tree+0x429/0x9b0 [ 239.395249][T20654] ? _raw_spin_unlock+0x26/0x40 [ 239.400111][T20654] ? __find_get_block+0x5d2/0x890 [ 239.405233][T20654] ? slab_post_alloc_hook+0x82/0x2f0 [ 239.410618][T20654] ? ext4_readdir+0x2b3/0x1ac0 [ 239.415376][T20654] ext4_readdir+0x15b0/0x1ac0 [ 239.420058][T20654] ? down_read_killable+0x170/0x6b0 [ 239.425256][T20654] ? fsnotify_perm+0x360/0x380 [ 239.430017][T20654] iterate_dir+0x128/0x300 [ 239.434522][T20654] exportfs_get_name+0x230/0x2a0 [ 239.439456][T20654] ? exportfs_decode_fh+0x70/0x70 [ 239.444527][T20654] reconnect_path+0x158/0x3e0 [ 239.449296][T20654] exportfs_decode_fh_raw+0x184/0x400 [ 239.454689][T20654] ? do_handle_open+0x3d0/0x3d0 [ 239.459547][T20654] ? do_handle_open+0x3d0/0x3d0 [ 239.464523][T20654] exportfs_decode_fh+0x3c/0x70 [ 239.469360][T20654] do_handle_open+0x2df/0x3d0 [ 239.474084][T20654] __x64_sys_open_by_handle_at+0x46/0x50 [ 239.479755][T20654] do_syscall_64+0x44/0x110 [ 239.484270][T20654] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 239.490167][T20654] RIP: 0033:0x7fbc0d2a7ce9 [ 239.495172][T20654] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 239.514923][T20654] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 239.523369][T20654] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 239.531355][T20654] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 239.539348][T20654] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 239.547324][T20654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./bus\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800300) 14:27:43 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 29) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:43 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 239.555296][T20654] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 239.563468][T20654] 14:27:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2d00, 0x0, 0x0, 0x600000}) [ 239.607455][T20687] ipvlan22: entered promiscuous mode [ 239.636941][T20685] FAULT_INJECTION: forcing a failure. [ 239.636941][T20685] name failslab, interval 1, probability 0, space 0, times 0 [ 239.649636][T20685] CPU: 1 PID: 20685 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 239.660172][T20685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 239.670296][T20685] Call Trace: [ 239.673672][T20685] [ 239.676616][T20685] dump_stack_lvl+0xda/0x130 [ 239.681234][T20685] dump_stack+0x15/0x20 [ 239.685422][T20685] should_fail_ex+0x21f/0x230 [ 239.690250][T20685] ? ext4_htree_store_dirent+0x5d/0x290 [ 239.695848][T20685] __should_failslab+0x92/0xa0 [ 239.700657][T20685] should_failslab+0x9/0x20 [ 239.705181][T20685] __kmem_cache_alloc_node+0x4e/0x210 [ 239.710599][T20685] ? ext4_htree_store_dirent+0x5d/0x290 [ 239.716194][T20685] __kmalloc+0x95/0x1a0 [ 239.720404][T20685] ext4_htree_store_dirent+0x5d/0x290 [ 239.725775][T20685] htree_dirblock_to_tree+0x4c3/0x630 [ 239.731307][T20685] ext4_htree_fill_tree+0x429/0x9b0 [ 239.736757][T20685] ? _raw_spin_unlock+0x26/0x40 [ 239.741620][T20685] ? __find_get_block+0x5d2/0x890 [ 239.746809][T20685] ? slab_post_alloc_hook+0x82/0x2f0 [ 239.752119][T20685] ? ext4_readdir+0x2b3/0x1ac0 [ 239.756883][T20685] ext4_readdir+0x15b0/0x1ac0 [ 239.761760][T20685] ? down_read_killable+0x170/0x6b0 [ 239.766986][T20685] ? fsnotify_perm+0x360/0x380 [ 239.771777][T20685] iterate_dir+0x128/0x300 [ 239.776200][T20685] exportfs_get_name+0x230/0x2a0 [ 239.781131][T20685] ? exportfs_decode_fh+0x70/0x70 [ 239.786236][T20685] reconnect_path+0x158/0x3e0 [ 239.790919][T20685] exportfs_decode_fh_raw+0x184/0x400 [ 239.796282][T20685] ? do_handle_open+0x3d0/0x3d0 [ 239.801231][T20685] ? do_handle_open+0x3d0/0x3d0 [ 239.806127][T20685] exportfs_decode_fh+0x3c/0x70 [ 239.810996][T20685] do_handle_open+0x2df/0x3d0 [ 239.815665][T20685] __x64_sys_open_by_handle_at+0x46/0x50 [ 239.821492][T20685] do_syscall_64+0x44/0x110 [ 239.826084][T20685] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 239.831966][T20685] RIP: 0033:0x7fbc0d2a7ce9 [ 239.836404][T20685] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 239.856028][T20685] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 239.864463][T20685] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 239.872433][T20685] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 14:27:44 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 30) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2d01, 0x0, 0x0, 0x600000}) 14:27:44 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./bus\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 239.880523][T20685] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 239.888489][T20685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 239.896549][T20685] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 239.904575][T20685] [ 239.944060][T20698] ipvlan15: entered promiscuous mode [ 239.956798][T20698] bridge0: port 2(ipvlan15) entered blocking state [ 239.963731][T20698] bridge0: port 2(ipvlan15) entered disabled state [ 239.967741][T20699] FAULT_INJECTION: forcing a failure. [ 239.967741][T20699] name failslab, interval 1, probability 0, space 0, times 0 [ 239.973481][T20698] ipvlan15: entered allmulticast mode [ 239.982886][T20699] CPU: 0 PID: 20699 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 239.982934][T20699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 239.988281][T20698] bridge0: entered allmulticast mode [ 239.998663][T20699] Call Trace: [ 239.998672][T20699] [ 239.998678][T20699] dump_stack_lvl+0xda/0x130 [ 239.998733][T20699] dump_stack+0x15/0x20 [ 240.019343][T20698] ipvlan15: left allmulticast mode [ 240.020230][T20699] should_fail_ex+0x21f/0x230 [ 240.024824][T20698] bridge0: left allmulticast mode 14:27:44 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800386) [ 240.028941][T20699] ? ext4_htree_store_dirent+0x5d/0x290 [ 240.028967][T20699] __should_failslab+0x92/0xa0 [ 240.054112][T20699] should_failslab+0x9/0x20 [ 240.058704][T20699] __kmem_cache_alloc_node+0x4e/0x210 [ 240.064103][T20699] ? ext4_htree_store_dirent+0x5d/0x290 [ 240.069667][T20699] __kmalloc+0x95/0x1a0 [ 240.073866][T20699] ext4_htree_store_dirent+0x5d/0x290 [ 240.079305][T20699] htree_dirblock_to_tree+0x4c3/0x630 [ 240.084789][T20699] ext4_htree_fill_tree+0x429/0x9b0 [ 240.090036][T20699] ? _raw_spin_unlock+0x26/0x40 [ 240.094870][T20699] ? __find_get_block+0x5d2/0x890 [ 240.099922][T20699] ? slab_post_alloc_hook+0x82/0x2f0 [ 240.105214][T20699] ? ext4_readdir+0x2b3/0x1ac0 [ 240.109972][T20699] ext4_readdir+0x15b0/0x1ac0 [ 240.114718][T20699] ? down_read_killable+0x170/0x6b0 [ 240.119907][T20699] ? fsnotify_perm+0x360/0x380 [ 240.124718][T20699] iterate_dir+0x128/0x300 [ 240.129322][T20699] exportfs_get_name+0x230/0x2a0 [ 240.134261][T20699] ? exportfs_decode_fh+0x70/0x70 [ 240.139371][T20699] reconnect_path+0x158/0x3e0 [ 240.144121][T20699] exportfs_decode_fh_raw+0x184/0x400 [ 240.149522][T20699] ? do_handle_open+0x3d0/0x3d0 [ 240.154422][T20699] ? do_handle_open+0x3d0/0x3d0 [ 240.159974][T20699] exportfs_decode_fh+0x3c/0x70 [ 240.164885][T20699] do_handle_open+0x2df/0x3d0 [ 240.169654][T20699] __x64_sys_open_by_handle_at+0x46/0x50 [ 240.175323][T20699] do_syscall_64+0x44/0x110 [ 240.179892][T20699] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 240.185861][T20699] RIP: 0033:0x7fbc0d2a7ce9 [ 240.190257][T20699] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 240.210188][T20699] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 240.218759][T20699] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 240.226729][T20699] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 240.234690][T20699] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 14:27:44 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 31) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 240.242852][T20699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.250826][T20699] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 240.258838][T20699] [ 240.273816][T20705] EXT4-fs: 18 callbacks suppressed [ 240.273829][T20705] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 240.295367][T20709] ipvlan22: entered promiscuous mode [ 240.304313][T20713] FAULT_INJECTION: forcing a failure. [ 240.304313][T20713] name failslab, interval 1, probability 0, space 0, times 0 [ 240.311694][T20717] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 240.316987][T20713] CPU: 0 PID: 20713 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./bus\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./bus\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) 14:27:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2e00, 0x0, 0x0, 0x600000}) 14:27:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800388) [ 240.337203][T20713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 240.347328][T20713] Call Trace: [ 240.350673][T20713] [ 240.353603][T20713] dump_stack_lvl+0xda/0x130 [ 240.358188][T20713] dump_stack+0x15/0x20 [ 240.362398][T20713] should_fail_ex+0x21f/0x230 [ 240.367251][T20713] __should_failslab+0x92/0xa0 [ 240.372037][T20713] should_failslab+0x9/0x20 [ 240.376547][T20713] slab_pre_alloc_hook+0x37/0x160 [ 240.381709][T20713] ? __d_alloc+0x3d/0x380 [ 240.386322][T20713] kmem_cache_alloc_lru+0x47/0x200 [ 240.391461][T20713] __d_alloc+0x3d/0x380 [ 240.395717][T20713] d_alloc_parallel+0x54/0xc90 [ 240.400505][T20713] ? selinux_inode_permission+0x33b/0x410 [ 240.406349][T20713] ? __rcu_read_unlock+0x4d/0x70 [ 240.411320][T20713] ? __d_lookup+0x357/0x380 [ 240.415885][T20713] ? inode_permission+0xbf/0x300 [ 240.420842][T20713] ? down_read+0x16f/0x4a0 [ 240.425268][T20713] __lookup_slow+0x8d/0x230 [ 240.429840][T20713] lookup_one_unlocked+0xcf/0x180 [ 240.434905][T20713] reconnect_path+0x1a8/0x3e0 [ 240.439648][T20713] exportfs_decode_fh_raw+0x184/0x400 [ 240.445006][T20713] ? do_handle_open+0x3d0/0x3d0 [ 240.449968][T20713] ? do_handle_open+0x3d0/0x3d0 [ 240.454882][T20713] exportfs_decode_fh+0x3c/0x70 [ 240.459744][T20713] do_handle_open+0x2df/0x3d0 [ 240.464453][T20713] __x64_sys_open_by_handle_at+0x46/0x50 [ 240.470178][T20713] do_syscall_64+0x44/0x110 [ 240.474753][T20713] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 240.480722][T20713] RIP: 0033:0x7fbc0d2a7ce9 [ 240.485118][T20713] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 240.504771][T20713] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 240.513188][T20713] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 240.521230][T20713] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 240.529191][T20713] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 240.537216][T20713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:27:44 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:44 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 32) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 240.545193][T20713] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 240.553326][T20713] [ 240.583967][T20722] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:44 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 240.598041][T20727] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 240.600833][T20725] ipvlan15: entered promiscuous mode [ 240.618728][T20725] bridge0: port 2(ipvlan15) entered blocking state [ 240.625364][T20725] bridge0: port 2(ipvlan15) entered disabled state [ 240.632345][T20725] ipvlan15: entered allmulticast mode [ 240.637786][T20725] bridge0: entered allmulticast mode [ 240.643860][T20728] FAULT_INJECTION: forcing a failure. [ 240.643860][T20728] name failslab, interval 1, probability 0, space 0, times 0 [ 240.651941][T20725] ipvlan15: left allmulticast mode [ 240.656555][T20728] CPU: 0 PID: 20728 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 240.661696][T20725] bridge0: left allmulticast mode [ 240.672035][T20728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 240.672047][T20728] Call Trace: [ 240.672054][T20728] [ 240.672061][T20728] dump_stack_lvl+0xda/0x130 14:27:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) umount2(&(0x7f0000000040)='./bus\x00', 0xe) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080038a) [ 240.697941][T20728] dump_stack+0x15/0x20 [ 240.702128][T20728] should_fail_ex+0x21f/0x230 [ 240.706899][T20728] ? getname_kernel+0x3d/0x1e0 [ 240.711665][T20728] __should_failslab+0x92/0xa0 [ 240.716497][T20728] should_failslab+0x9/0x20 [ 240.721039][T20728] kmem_cache_alloc+0x4e/0x250 [ 240.725818][T20728] getname_kernel+0x3d/0x1e0 [ 240.730460][T20728] do_file_open_root+0xbe/0x390 [ 240.735449][T20728] file_open_root+0xf9/0x120 [ 240.740060][T20728] do_handle_open+0x367/0x3d0 [ 240.744802][T20728] __x64_sys_open_by_handle_at+0x46/0x50 [ 240.750432][T20728] do_syscall_64+0x44/0x110 [ 240.754985][T20728] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 240.760868][T20728] RIP: 0033:0x7fbc0d2a7ce9 [ 240.765280][T20728] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 240.784913][T20728] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 33) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 240.793308][T20728] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 240.801264][T20728] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 240.809232][T20728] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 240.817216][T20728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.825252][T20728] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 240.833213][T20728] 14:27:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2e01, 0x0, 0x0, 0x600000}) [ 240.858734][T20749] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 240.876202][T20732] ipvlan22: entered promiscuous mode [ 240.881634][T20751] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 240.889724][T20747] FAULT_INJECTION: forcing a failure. [ 240.889724][T20747] name failslab, interval 1, probability 0, space 0, times 0 [ 240.904293][T20747] CPU: 1 PID: 20747 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 240.914787][T20747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 240.924855][T20747] Call Trace: [ 240.928148][T20747] [ 240.931160][T20747] dump_stack_lvl+0xda/0x130 [ 240.935773][T20747] dump_stack+0x15/0x20 [ 240.939979][T20747] should_fail_ex+0x21f/0x230 [ 240.944799][T20747] ? alloc_empty_file+0xd0/0x310 [ 240.949899][T20747] __should_failslab+0x92/0xa0 [ 240.954669][T20747] should_failslab+0x9/0x20 [ 240.959189][T20747] kmem_cache_alloc+0x4e/0x250 [ 240.963964][T20747] alloc_empty_file+0xd0/0x310 [ 240.968724][T20747] path_openat+0x69/0x1d70 [ 240.973146][T20747] ? __lookup_slow+0x205/0x230 [ 240.977919][T20747] ? lockref_put_return+0x106/0x150 [ 240.983107][T20747] ? getname_kernel+0x3d/0x1e0 [ 240.987918][T20747] ? kmem_cache_alloc+0x15a/0x250 [ 240.993027][T20747] do_file_open_root+0x1a3/0x390 [ 240.997958][T20747] file_open_root+0xf9/0x120 [ 241.002566][T20747] do_handle_open+0x367/0x3d0 [ 241.007256][T20747] __x64_sys_open_by_handle_at+0x46/0x50 [ 241.012876][T20747] do_syscall_64+0x44/0x110 [ 241.017436][T20747] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 241.023379][T20747] RIP: 0033:0x7fbc0d2a7ce9 [ 241.027849][T20747] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 241.047452][T20747] RSP: 002b:00007fbc0c62a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 14:27:45 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2f00, 0x0, 0x0, 0x600000}) 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) (fail_nth: 34) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 241.055859][T20747] RAX: ffffffffffffffda RBX: 00007fbc0d3c6f80 RCX: 00007fbc0d2a7ce9 [ 241.063905][T20747] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 241.071864][T20747] RBP: 00007fbc0c62a120 R08: 0000000000000000 R09: 0000000000000000 [ 241.079930][T20747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.087886][T20747] R13: 000000000000000b R14: 00007fbc0d3c6f80 R15: 00007ffe28258718 [ 241.095937][T20747] 14:27:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080038e) 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) umount2(&(0x7f0000000040)='./bus\x00', 0xe) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:45 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 241.130692][T20756] ipvlan15: entered promiscuous mode [ 241.137776][T20756] bridge0: port 2(ipvlan15) entered blocking state [ 241.144497][T20756] bridge0: port 2(ipvlan15) entered disabled state [ 241.153850][T20756] ipvlan15: entered allmulticast mode [ 241.159372][T20756] bridge0: entered allmulticast mode 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 241.185088][T20756] ipvlan15: left allmulticast mode [ 241.190297][T20756] bridge0: left allmulticast mode [ 241.205981][T20769] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 241.216623][T20766] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x2f01, 0x0, 0x0, 0x600000}) 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x2, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 241.232589][T20767] ipvlan22: entered promiscuous mode 14:27:45 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080044a) 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) umount2(&(0x7f0000000040)='./bus\x00', 0xe) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async, rerun: 32) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async, rerun: 32) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:45 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 241.295108][T20781] ipvlan15: entered promiscuous mode [ 241.325433][T20781] bridge0: port 2(ipvlan15) entered blocking state [ 241.332098][T20781] bridge0: port 2(ipvlan15) entered disabled state 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x7, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) utime(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000440)={0x5de, 0x8ab2}) mount$bind(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x121000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000380), 0x88000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)='./file0/file0\x00') [ 241.344702][T20781] ipvlan15: entered allmulticast mode [ 241.350213][T20781] bridge0: entered allmulticast mode [ 241.355707][T20789] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 241.356741][T20781] ipvlan15: left allmulticast mode [ 241.370772][T20781] bridge0: left allmulticast mode 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0xb, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080044c) [ 241.400841][T20784] ipvlan22: entered promiscuous mode 14:27:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3000, 0x0, 0x0, 0x600000}) 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) utime(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000440)={0x5de, 0x8ab2}) mount$bind(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x121000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000380), 0x88000, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)='./file0/file0\x00') 14:27:45 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x15, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0xc, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080044e) [ 241.429177][T20796] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) utime(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000440)={0x5de, 0x8ab2}) mount$bind(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x121000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000380), 0x88000, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (rerun: 64) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async, rerun: 64) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)='./file0/file0\x00') 14:27:45 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0xe, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x5209420, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800452) [ 241.527457][T20813] ipvlan15: entered promiscuous mode [ 241.534999][T20813] bridge0: port 2(ipvlan15) entered blocking state [ 241.541721][T20813] bridge0: port 2(ipvlan15) entered disabled state [ 241.549931][T20813] ipvlan15: entered allmulticast mode [ 241.555360][T20813] bridge0: entered allmulticast mode [ 241.561574][T20813] ipvlan15: left allmulticast mode [ 241.566955][T20813] bridge0: left allmulticast mode 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x2e, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 241.602774][T20822] ipvlan22: entered promiscuous mode 14:27:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3001, 0x0, 0x0, 0x600000}) 14:27:45 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x4e, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x5209420, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x5209420, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) 14:27:45 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x1e, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800500) 14:27:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3100, 0x0, 0x0, 0x600000}) 14:27:45 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x3, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x7, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 241.738618][T20845] ipvlan15: entered promiscuous mode [ 241.746842][T20845] bridge0: port 2(ipvlan15) entered blocking state [ 241.753523][T20845] bridge0: port 2(ipvlan15) entered disabled state [ 241.761513][T20845] ipvlan15: entered allmulticast mode [ 241.766984][T20845] bridge0: entered allmulticast mode [ 241.774063][T20845] ipvlan15: left allmulticast mode [ 241.779247][T20845] bridge0: left allmulticast mode 14:27:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x5209420, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3101, 0x0, 0x0, 0x600000}) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800508) [ 241.800023][T20852] ipvlan22: entered promiscuous mode 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x8, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3200, 0x0, 0x0, 0x600000}) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0xa, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080050a) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3201, 0x0, 0x0, 0x600000}) 14:27:46 executing program 2: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='nomand\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x60) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10002, 0x20) fchownat(r2, &(0x7f0000000180)='./bus\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x100) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000300)="8473669f367e735d22c60ae11574c51b1bebe6d03d094b5c6ef48b874155beb682322f464c19c1764ed8e5c531ccf724a1f7ed78e8e7c9f244b0fb96663782131709d7da3f10ef6ddf7bd549c158e7", 0x4f}, {&(0x7f0000000380)="5fa0", 0x2}, {&(0x7f00000004c0)="5db23dd74d835e39029aa2c1acd7b82de6830de6ac086918ec86f2c9f02cedbd39ca364c310b3e0cc5248c7701f9274c26336fc4fa3bfff75dd1916182acbdb0c8f3b1df671f4818a630a90a7a6c610552f89f32aee068e5808e19984f0415bfda686aa387c94c1afe900f7d4f804d50307604c24a94154479b854d786cb47cf6f63c3b152473cc00feacc06c449b4d90b0ae0ac1aa44674632a781c6565213344319ebc4f910186de998d308f059e78261106f5449b48a56b6871378863dcae97d5e8902d310651811b2255e707e8ee16ae9b8b", 0xd4}, {&(0x7f00000003c0)="9f40105b7d5f7c5ce3342ff51117fa744d15cba46bad6100dd74425aa56e4879537688c16dccbdade9cef6adf9c30327f4d0f222ac41dc0833b89a263f696527da027e938b0634c528c2d213ecf5c4816e981ab4ed9c49a1d1e3837b2b48d03a", 0x60}], 0x4) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0xb, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 241.921376][T20885] ipvlan22: entered promiscuous mode [ 241.946718][T20890] ipvlan15: entered promiscuous mode [ 241.958325][T20890] bridge0: port 2(ipvlan15) entered blocking state [ 241.965084][T20890] bridge0: port 2(ipvlan15) entered disabled state 14:27:46 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 2: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='nomand\x00', 0x0, 0x0) (async) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='nomand\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x60) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x60) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10002, 0x20) fchownat(r2, &(0x7f0000000180)='./bus\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x100) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000300)="8473669f367e735d22c60ae11574c51b1bebe6d03d094b5c6ef48b874155beb682322f464c19c1764ed8e5c531ccf724a1f7ed78e8e7c9f244b0fb96663782131709d7da3f10ef6ddf7bd549c158e7", 0x4f}, {&(0x7f0000000380)="5fa0", 0x2}, {&(0x7f00000004c0)="5db23dd74d835e39029aa2c1acd7b82de6830de6ac086918ec86f2c9f02cedbd39ca364c310b3e0cc5248c7701f9274c26336fc4fa3bfff75dd1916182acbdb0c8f3b1df671f4818a630a90a7a6c610552f89f32aee068e5808e19984f0415bfda686aa387c94c1afe900f7d4f804d50307604c24a94154479b854d786cb47cf6f63c3b152473cc00feacc06c449b4d90b0ae0ac1aa44674632a781c6565213344319ebc4f910186de998d308f059e78261106f5449b48a56b6871378863dcae97d5e8902d310651811b2255e707e8ee16ae9b8b", 0xd4}, {&(0x7f00000003c0)="9f40105b7d5f7c5ce3342ff51117fa744d15cba46bad6100dd74425aa56e4879537688c16dccbdade9cef6adf9c30327f4d0f222ac41dc0833b89a263f696527da027e938b0634c528c2d213ecf5c4816e981ab4ed9c49a1d1e3837b2b48d03a", 0x60}], 0x4) [ 241.977754][T20890] ipvlan15: entered allmulticast mode [ 241.983294][T20890] bridge0: entered allmulticast mode [ 241.997235][T20890] ipvlan15: left allmulticast mode [ 242.002422][T20890] bridge0: left allmulticast mode 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080050c) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x28, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 242.041727][T20899] ipvlan22: entered promiscuous mode 14:27:46 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x25, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 2: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='nomand\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x60) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10002, 0x20) fchownat(r2, &(0x7f0000000180)='./bus\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x100) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000300)="8473669f367e735d22c60ae11574c51b1bebe6d03d094b5c6ef48b874155beb682322f464c19c1764ed8e5c531ccf724a1f7ed78e8e7c9f244b0fb96663782131709d7da3f10ef6ddf7bd549c158e7", 0x4f}, {&(0x7f0000000380)="5fa0", 0x2}, {&(0x7f00000004c0)="5db23dd74d835e39029aa2c1acd7b82de6830de6ac086918ec86f2c9f02cedbd39ca364c310b3e0cc5248c7701f9274c26336fc4fa3bfff75dd1916182acbdb0c8f3b1df671f4818a630a90a7a6c610552f89f32aee068e5808e19984f0415bfda686aa387c94c1afe900f7d4f804d50307604c24a94154479b854d786cb47cf6f63c3b152473cc00feacc06c449b4d90b0ae0ac1aa44674632a781c6565213344319ebc4f910186de998d308f059e78261106f5449b48a56b6871378863dcae97d5e8902d310651811b2255e707e8ee16ae9b8b", 0xd4}, {&(0x7f00000003c0)="9f40105b7d5f7c5ce3342ff51117fa744d15cba46bad6100dd74425aa56e4879537688c16dccbdade9cef6adf9c30327f4d0f222ac41dc0833b89a263f696527da027e938b0634c528c2d213ecf5c4816e981ab4ed9c49a1d1e3837b2b48d03a", 0x60}], 0x4) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='nomand\x00', 0x0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x60) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10002, 0x20) (async) fchownat(r2, &(0x7f0000000180)='./bus\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x100) (async) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000300)="8473669f367e735d22c60ae11574c51b1bebe6d03d094b5c6ef48b874155beb682322f464c19c1764ed8e5c531ccf724a1f7ed78e8e7c9f244b0fb96663782131709d7da3f10ef6ddf7bd549c158e7", 0x4f}, {&(0x7f0000000380)="5fa0", 0x2}, {&(0x7f00000004c0)="5db23dd74d835e39029aa2c1acd7b82de6830de6ac086918ec86f2c9f02cedbd39ca364c310b3e0cc5248c7701f9274c26336fc4fa3bfff75dd1916182acbdb0c8f3b1df671f4818a630a90a7a6c610552f89f32aee068e5808e19984f0415bfda686aa387c94c1afe900f7d4f804d50307604c24a94154479b854d786cb47cf6f63c3b152473cc00feacc06c449b4d90b0ae0ac1aa44674632a781c6565213344319ebc4f910186de998d308f059e78261106f5449b48a56b6871378863dcae97d5e8902d310651811b2255e707e8ee16ae9b8b", 0xd4}, {&(0x7f00000003c0)="9f40105b7d5f7c5ce3342ff51117fa744d15cba46bad6100dd74425aa56e4879537688c16dccbdade9cef6adf9c30327f4d0f222ac41dc0833b89a263f696527da027e938b0634c528c2d213ecf5c4816e981ab4ed9c49a1d1e3837b2b48d03a", 0x60}], 0x4) (async) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3300, 0x0, 0x0, 0x600000}) 14:27:46 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0xffffffde, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x3, 0x730) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080), 0x220146a, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c76657255156f6e3d3970323030302c616e616d653d6d6f756e74696e666f002c616669643d3078383030303030303030303030303030302c0200000000000000616669643d3078303030303030303030303030303030332c7569643e", @ANYRESDEC=0xee01, @ANYBLOB=',pcr=00000000000000000045,\x00']) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 242.123829][T20923] ipvlan15: entered promiscuous mode [ 242.131664][T20923] bridge0: port 2(ipvlan15) entered blocking state [ 242.138426][T20923] bridge0: port 2(ipvlan15) entered disabled state [ 242.147862][T20923] ipvlan15: entered allmulticast mode [ 242.153341][T20923] bridge0: entered allmulticast mode [ 242.164986][T20923] ipvlan15: left allmulticast mode 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800510) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x2}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 242.170179][T20923] bridge0: left allmulticast mode 14:27:46 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x3, 0x730) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080), 0x220146a, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c76657255156f6e3d3970323030302c616e616d653d6d6f756e74696e666f002c616669643d3078383030303030303030303030303030302c0200000000000000616669643d3078303030303030303030303030303030332c7569643e", @ANYRESDEC=0xee01, @ANYBLOB=',pcr=00000000000000000045,\x00']) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x8}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3301, 0x0, 0x0, 0x600000}) [ 242.206645][T20925] ipvlan22: entered promiscuous mode 14:27:46 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xc}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008005c6) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3400, 0x0, 0x0, 0x600000}) 14:27:46 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x3, 0x730) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080), 0x220146a, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c76657255156f6e3d3970323030302c616e616d653d6d6f756e74696e666f002c616669643d3078383030303030303030303030303030302c0200000000000000616669643d3078303030303030303030303030303030332c7569643e", @ANYRESDEC=0xee01, @ANYBLOB=',pcr=00000000000000000045,\x00']) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x3, 0x730) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080), 0x220146a, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c76657255156f6e3d3970323030302c616e616d653d6d6f756e74696e666f002c616669643d3078383030303030303030303030303030302c0200000000000000616669643d3078303030303030303030303030303030332c7569643e", @ANYRESDEC=0xee01, @ANYBLOB=',pcr=00000000000000000045,\x00']) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) sendfile(r1, r0, 0x0, 0x100800001) (async) [ 242.332870][T20949] ipvlan15: entered promiscuous mode [ 242.351378][T20949] bridge0: port 2(ipvlan15) entered blocking state [ 242.357945][T20949] bridge0: port 2(ipvlan15) entered disabled state 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x6b}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008005c8) 14:27:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xd0052, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) [ 242.391043][T20949] ipvlan15: entered allmulticast mode [ 242.396540][T20949] bridge0: entered allmulticast mode [ 242.404564][T20949] ipvlan15: left allmulticast mode [ 242.409739][T20949] bridge0: left allmulticast mode 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x73}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3401, 0x0, 0x0, 0x600000}) 14:27:46 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x30, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 242.447342][T20956] ipvlan22: entered promiscuous mode 14:27:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xd0052, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008005ca) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xd0052, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) (async) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800001) 14:27:46 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x15, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 242.530338][T20981] ipvlan15: entered promiscuous mode 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b1}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008005ce) [ 242.551590][T20981] bridge0: port 2(ipvlan15) entered blocking state [ 242.558238][T20981] bridge0: port 2(ipvlan15) entered disabled state [ 242.575419][T20981] ipvlan15: entered allmulticast mode [ 242.580905][T20981] bridge0: entered allmulticast mode [ 242.587096][T20981] ipvlan15: left allmulticast mode [ 242.592406][T20981] bridge0: left allmulticast mode 14:27:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180), 0x8428, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, 0x0, @none}, &(0x7f0000000380)=0xe, 0x800) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000600)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) r1 = epoll_create(0x101) write$binfmt_script(r1, &(0x7f00000003c0)={'#! ', './file0/../file0', [{0x20, 'mountinfo\x00'}, {0x20, ']\x9a'}, {0x20, 'GPL\x00'}, {}, {}, {0x20, 'pipefs\x00'}, {0x20, '!,H[\\$:/(!^\x00'}, {0x20, '[-'}, {0x20, '%'}], 0xa, "00be976efc43da3d2a0787686a7ee5dac68622eeaf11d5fbdd4998d63d4a00cb1faca9f50ded4e007628b8cc3ab0afdb31493dd4effe0d3252210bdb4e378ac23f3284122a1268d9f95e7c6f29867221ea3a6c03ef"}, 0x98) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r3 = open(&(0x7f0000000140)='./bus\x00', 0x141ac2, 0x0) sendfile(r3, r2, 0x0, 0x100800001) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) lseek(r4, 0xdf, 0x3) 14:27:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3500, 0x0, 0x0, 0x600000}) [ 242.616845][T20996] ipvlan22: entered promiscuous mode 14:27:46 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x34, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800600) 14:27:46 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b3}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:46 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x18, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 242.683306][T21010] ipvlan15: entered promiscuous mode [ 242.694046][T21010] bridge0: port 2(ipvlan15) entered blocking state [ 242.700851][T21010] bridge0: port 2(ipvlan15) entered disabled state [ 242.715945][T21010] ipvlan15: entered allmulticast mode [ 242.721474][T21010] bridge0: entered allmulticast mode [ 242.727451][T21010] ipvlan15: left allmulticast mode 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b4}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 242.732685][T21010] bridge0: left allmulticast mode 14:27:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) (async) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180), 0x8428, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) (async) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, 0x0, @none}, &(0x7f0000000380)=0xe, 0x800) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000600)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async, rerun: 64) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) (async, rerun: 64) r1 = epoll_create(0x101) write$binfmt_script(r1, &(0x7f00000003c0)={'#! ', './file0/../file0', [{0x20, 'mountinfo\x00'}, {0x20, ']\x9a'}, {0x20, 'GPL\x00'}, {}, {}, {0x20, 'pipefs\x00'}, {0x20, '!,H[\\$:/(!^\x00'}, {0x20, '[-'}, {0x20, '%'}], 0xa, "00be976efc43da3d2a0787686a7ee5dac68622eeaf11d5fbdd4998d63d4a00cb1faca9f50ded4e007628b8cc3ab0afdb31493dd4effe0d3252210bdb4e378ac23f3284122a1268d9f95e7c6f29867221ea3a6c03ef"}, 0x98) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async, rerun: 64) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141ac2, 0x0) (rerun: 64) sendfile(r3, r2, 0x0, 0x100800001) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) lseek(r4, 0xdf, 0x3) 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080067e) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3501, 0x0, 0x0, 0x600000}) [ 242.762472][T21019] ipvlan22: entered promiscuous mode 14:27:47 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x36, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b5}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800680) 14:27:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180), 0x8428, 0x0) (async) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, 0x0, @none}, &(0x7f0000000380)=0xe, 0x800) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000600)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) r1 = epoll_create(0x101) write$binfmt_script(r1, &(0x7f00000003c0)={'#! ', './file0/../file0', [{0x20, 'mountinfo\x00'}, {0x20, ']\x9a'}, {0x20, 'GPL\x00'}, {}, {}, {0x20, 'pipefs\x00'}, {0x20, '!,H[\\$:/(!^\x00'}, {0x20, '[-'}, {0x20, '%'}], 0xa, "00be976efc43da3d2a0787686a7ee5dac68622eeaf11d5fbdd4998d63d4a00cb1faca9f50ded4e007628b8cc3ab0afdb31493dd4effe0d3252210bdb4e378ac23f3284122a1268d9f95e7c6f29867221ea3a6c03ef"}, 0x98) (async) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r3 = open(&(0x7f0000000140)='./bus\x00', 0x141ac2, 0x0) sendfile(r3, r2, 0x0, 0x100800001) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) lseek(r4, 0xdf, 0x3) [ 242.845433][T21033] ipvlan15: entered promiscuous mode [ 242.857736][T21033] bridge0: port 2(ipvlan15) entered blocking state [ 242.864479][T21033] bridge0: port 2(ipvlan15) entered disabled state [ 242.886117][T21033] ipvlan15: entered allmulticast mode 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b6}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800682) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3600, 0x0, 0x0, 0x600000}) [ 242.891597][T21033] bridge0: entered allmulticast mode [ 242.905276][T21033] ipvlan15: left allmulticast mode [ 242.910548][T21033] bridge0: left allmulticast mode 14:27:47 executing program 2: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x4b8}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 242.951385][T21041] ipvlan22: entered promiscuous mode 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x57f}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800686) [ 243.002452][T21055] ipvlan2: entered promiscuous mode 14:27:47 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x25, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x581}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800166) [ 243.040394][T21061] ipvlan15: entered promiscuous mode [ 243.055935][T21061] bridge0: port 2(ipvlan15) entered blocking state [ 243.062613][T21061] bridge0: port 2(ipvlan15) entered disabled state 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x772}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 243.086888][T21061] ipvlan15: entered allmulticast mode [ 243.092338][T21061] bridge0: entered allmulticast mode [ 243.101850][T21061] ipvlan15: left allmulticast mode [ 243.107127][T21061] bridge0: left allmulticast mode 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800700) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x2001}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3601, 0x0, 0x0, 0x600000}) [ 243.146145][T21069] ipvlan22: entered promiscuous mode 14:27:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x4) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r5 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r5, r4, 0x0, 0x100800001) 14:27:47 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3700, 0x0, 0x0, 0x600000}) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 243.225514][T21089] ipvlan15: entered promiscuous mode [ 243.235495][T21089] bridge0: port 2(ipvlan15) entered blocking state [ 243.242247][T21089] bridge0: port 2(ipvlan15) entered disabled state [ 243.258127][T21089] ipvlan15: entered allmulticast mode [ 243.263668][T21089] bridge0: entered allmulticast mode 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800736) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x3}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3701, 0x0, 0x0, 0x600000}) 14:27:47 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 243.289220][T21089] ipvlan15: left allmulticast mode [ 243.294508][T21089] bridge0: left allmulticast mode 14:27:47 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x4}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3800, 0x0, 0x0, 0x600000}) [ 243.349733][T21102] ipvlan22: entered promiscuous mode 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800738) 14:27:47 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x34, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x6}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 243.432101][T21123] ipvlan15: entered promiscuous mode 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xb}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3801, 0x0, 0x0, 0x600000}) [ 243.466932][T21123] bridge0: port 2(ipvlan15) entered blocking state [ 243.473544][T21123] bridge0: port 2(ipvlan15) entered disabled state [ 243.485242][T21123] ipvlan15: entered allmulticast mode [ 243.490773][T21123] bridge0: entered allmulticast mode [ 243.503150][T21123] ipvlan15: left allmulticast mode [ 243.508462][T21123] bridge0: left allmulticast mode 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080073a) 14:27:47 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xc}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 243.542506][T21131] ipvlan22: entered promiscuous mode 14:27:47 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080073e) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x18}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:47 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 243.613778][T21153] ipvlan15: entered promiscuous mode 14:27:47 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:47 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2e}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 243.646295][T21153] bridge0: port 2(ipvlan15) entered blocking state [ 243.652917][T21153] bridge0: port 2(ipvlan15) entered disabled state [ 243.666585][T21153] ipvlan15: entered allmulticast mode [ 243.672046][T21153] bridge0: entered allmulticast mode [ 243.678079][T21153] ipvlan15: left allmulticast mode [ 243.683272][T21153] bridge0: left allmulticast mode 14:27:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3900, 0x0, 0x0, 0x600000}) 14:27:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008007e8) [ 243.711871][T21164] ipvlan22: entered promiscuous mode 14:27:48 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2f}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3901, 0x0, 0x0, 0x600000}) 14:27:48 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008007ea) 14:27:48 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 243.809775][T21181] ipvlan15: entered promiscuous mode [ 243.840886][T21181] bridge0: port 2(ipvlan15) entered blocking state [ 243.847458][T21181] bridge0: port 2(ipvlan15) entered disabled state 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xc0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 243.861996][T21181] ipvlan15: entered allmulticast mode [ 243.867417][T21181] bridge0: entered allmulticast mode [ 243.874757][T21181] ipvlan15: left allmulticast mode [ 243.880002][T21181] bridge0: left allmulticast mode 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3a00, 0x0, 0x0, 0x600000}) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x300}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008007ec) [ 243.922426][T21191] ipvlan22: entered promiscuous mode 14:27:48 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x600}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3a01, 0x0, 0x0, 0x600000}) 14:27:48 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008007f0) 14:27:48 executing program 2: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 244.049851][T21224] ipvlan15: entered promiscuous mode 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xb00}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: socket(0x0, 0x803, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3b00, 0x0, 0x0, 0x600000}) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008008a6) [ 244.075096][T21224] bridge0: port 2(ipvlan15) entered blocking state [ 244.081752][T21224] bridge0: port 2(ipvlan15) entered disabled state [ 244.103088][T21224] ipvlan15: entered allmulticast mode [ 244.108778][T21224] bridge0: entered allmulticast mode [ 244.114882][T21224] ipvlan15: left allmulticast mode [ 244.120168][T21224] bridge0: left allmulticast mode [ 244.152769][T21228] ipvlan22: entered promiscuous mode 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xc00}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008008a8) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3b01, 0x0, 0x0, 0x600000}) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x1091}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008008aa) [ 244.253490][T21255] ipvlan15: entered promiscuous mode [ 244.262326][T21255] bridge0: port 2(ipvlan15) entered blocking state [ 244.268901][T21255] bridge0: port 2(ipvlan15) entered disabled state 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 244.297234][T21255] ipvlan15: entered allmulticast mode [ 244.302698][T21255] bridge0: entered allmulticast mode [ 244.325905][T21255] ipvlan15: left allmulticast mode [ 244.331208][T21255] bridge0: left allmulticast mode 14:27:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x1092}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x1008008ae) 14:27:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 244.364706][T21261] ipvlan22: entered promiscuous mode 14:27:48 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3c00, 0x0, 0x0, 0x600000}) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x1800}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800900) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) [ 244.441437][T21284] ipvlan15: entered promiscuous mode [ 244.448124][T21284] bridge0: port 2(ipvlan15) entered blocking state [ 244.454813][T21284] bridge0: port 2(ipvlan15) entered disabled state 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2e00}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x0, 0x2}}, 0x0) [ 244.501024][T21284] ipvlan15: entered allmulticast mode [ 244.506450][T21284] bridge0: entered allmulticast mode [ 244.521314][T21284] ipvlan15: left allmulticast mode [ 244.526462][T21284] bridge0: left allmulticast mode 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080095e) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2f00}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 244.560011][T21293] ipvlan22: entered promiscuous mode 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x0, 0x2}}, 0x0) 14:27:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3c01, 0x0, 0x0, 0x600000}) 14:27:48 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x3f00}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x0, 0x2}}, 0x0) 14:27:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800960) [ 244.616324][T21313] ipvlan15: entered promiscuous mode [ 244.631604][T21313] bridge0: port 2(ipvlan15) entered blocking state [ 244.638282][T21313] bridge0: port 2(ipvlan15) entered disabled state [ 244.652735][T21313] ipvlan15: entered allmulticast mode [ 244.658189][T21313] bridge0: entered allmulticast mode 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) 14:27:48 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x9110}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) [ 244.685464][T21313] ipvlan15: left allmulticast mode [ 244.690719][T21313] bridge0: left allmulticast mode 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800962) 14:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) [ 244.730911][T21325] ipvlan22: entered promiscuous mode 14:27:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x10080073a) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x9210}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3d00, 0x0, 0x0, 0x600000}) 14:27:49 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800966) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xc000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x10040}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 244.854628][T21352] ipvlan22: entered promiscuous mode 14:27:49 executing program 2: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3d01, 0x0, 0x0, 0x600000}) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800a00) 14:27:49 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 244.898445][T21350] ipvlan15: entered promiscuous mode [ 244.912690][T21350] bridge0: port 2(ipvlan15) entered blocking state [ 244.919492][T21350] bridge0: port 2(ipvlan15) entered disabled state [ 244.937351][T21350] ipvlan15: entered allmulticast mode [ 244.942808][T21350] bridge0: entered allmulticast mode 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x80000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x80040}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800a16) [ 244.957857][T21350] ipvlan15: left allmulticast mode [ 244.963122][T21350] bridge0: left allmulticast mode [ 244.994082][T21362] ipvlan2: entered promiscuous mode 14:27:49 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xad, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3e00, 0x0, 0x0, 0x600000}) [ 245.021760][T21373] ipvlan22: entered promiscuous mode 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xc00000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800a18) 14:27:49 executing program 2: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xad, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 245.083720][T21383] ipvlan15: entered promiscuous mode [ 245.097426][T21383] bridge0: port 2(ipvlan15) entered blocking state [ 245.104166][T21383] bridge0: port 2(ipvlan15) entered disabled state [ 245.112357][T21383] ipvlan15: entered allmulticast mode [ 245.117961][T21383] bridge0: entered allmulticast mode 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x1000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3e01, 0x0, 0x0, 0x600000}) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800a1a) [ 245.135941][T21383] ipvlan15: left allmulticast mode [ 245.141139][T21383] bridge0: left allmulticast mode [ 245.162845][T21390] ipvlan2: entered promiscuous mode 14:27:49 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 245.209884][T21394] ipvlan22: entered promiscuous mode 14:27:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3f00, 0x0, 0x0, 0x600000}) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2b019f4}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800a1e) [ 245.258803][T21407] ipvlan15: entered promiscuous mode [ 245.266484][T21407] bridge0: port 2(ipvlan15) entered blocking state [ 245.273074][T21407] bridge0: port 2(ipvlan15) entered disabled state [ 245.283389][T21407] ipvlan15: entered allmulticast mode [ 245.288849][T21407] bridge0: entered allmulticast mode [ 245.302383][T21407] ipvlan15: left allmulticast mode 14:27:49 executing program 2: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2e0ceb0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.307534][T21407] bridge0: left allmulticast mode 14:27:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x3f01, 0x0, 0x0, 0x600000}) 14:27:49 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x3000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.339726][T21416] EXT4-fs: 56 callbacks suppressed [ 245.339741][T21416] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 245.379879][T21420] ipvlan2: entered promiscuous mode 14:27:49 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd1, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800ac8) [ 245.386871][T21420] bridge0: port 3(ipvlan2) entered blocking state [ 245.393423][T21420] bridge0: port 3(ipvlan2) entered disabled state [ 245.404576][T21420] ipvlan2: entered allmulticast mode [ 245.409952][T21420] bridge0: entered allmulticast mode [ 245.421152][T21420] ipvlan2: left allmulticast mode [ 245.426264][T21420] bridge0: left allmulticast mode 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x4000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.460760][T21434] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 245.474928][T21427] ipvlan22: entered promiscuous mode 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x5e6285e}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (fail_nth: 1) 14:27:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800aca) [ 245.501513][T21431] ipvlan15: entered promiscuous mode [ 245.514050][T21431] bridge0: port 2(ipvlan15) entered blocking state [ 245.520756][T21431] bridge0: port 2(ipvlan15) entered disabled state [ 245.530891][T21431] ipvlan15: entered allmulticast mode [ 245.536331][T21431] bridge0: entered allmulticast mode 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x6000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.550236][T21431] ipvlan15: left allmulticast mode [ 245.555422][T21431] bridge0: left allmulticast mode [ 245.566214][T21445] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 245.569359][T21447] FAULT_INJECTION: forcing a failure. [ 245.569359][T21447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.589206][T21447] CPU: 1 PID: 21447 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x8105c86}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:49 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xb000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.599712][T21447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 245.609823][T21447] Call Trace: [ 245.613281][T21447] [ 245.616213][T21447] dump_stack_lvl+0xda/0x130 [ 245.621088][T21447] dump_stack+0x15/0x20 [ 245.625522][T21447] should_fail_ex+0x21f/0x230 [ 245.630228][T21447] should_fail+0xb/0x10 [ 245.634429][T21447] should_fail_usercopy+0x1a/0x20 [ 245.639486][T21447] _copy_from_user+0x1e/0xd0 [ 245.644113][T21447] do_handle_open+0x6c/0x3d0 [ 245.648772][T21447] __x64_sys_open_by_handle_at+0x46/0x50 [ 245.654433][T21447] do_syscall_64+0x44/0x110 [ 245.659036][T21447] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 245.665064][T21447] RIP: 0033:0x7f15422fbce9 [ 245.669614][T21447] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 245.689612][T21447] RSP: 002b:00007f154167e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xc000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.698035][T21447] RAX: ffffffffffffffda RBX: 00007f154241af80 RCX: 00007f15422fbce9 [ 245.706014][T21447] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 245.713991][T21447] RBP: 00007f154167e120 R08: 0000000000000000 R09: 0000000000000000 [ 245.722644][T21447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.730634][T21447] R13: 000000000000000b R14: 00007f154241af80 R15: 00007ffd38e4db98 [ 245.738660][T21447] 14:27:50 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd1, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4000, 0x0, 0x0, 0x600000}) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (fail_nth: 2) 14:27:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800acc) 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x18000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x10b, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 245.805723][T21466] ipvlan22: entered promiscuous mode 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x1cd0ef8a}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.831981][T21473] FAULT_INJECTION: forcing a failure. [ 245.831981][T21473] name failslab, interval 1, probability 0, space 0, times 0 [ 245.844676][T21473] CPU: 0 PID: 21473 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 245.855097][T21473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 245.865155][T21473] Call Trace: [ 245.868441][T21473] [ 245.871427][T21473] dump_stack_lvl+0xda/0x130 [ 245.876176][T21473] dump_stack+0x15/0x20 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x24b168ae}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2e000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.880361][T21473] should_fail_ex+0x21f/0x230 [ 245.885135][T21473] ? do_handle_open+0x108/0x3d0 [ 245.890099][T21473] __should_failslab+0x92/0xa0 [ 245.895714][T21473] should_failslab+0x9/0x20 [ 245.900416][T21473] __kmem_cache_alloc_node+0x4e/0x210 [ 245.905862][T21473] ? do_handle_open+0x108/0x3d0 [ 245.910819][T21473] __kmalloc+0x95/0x1a0 [ 245.914991][T21473] do_handle_open+0x108/0x3d0 [ 245.919760][T21473] __x64_sys_open_by_handle_at+0x46/0x50 [ 245.925497][T21473] do_syscall_64+0x44/0x110 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2f000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 245.930080][T21473] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 245.936046][T21473] RIP: 0033:0x7f15422fbce9 [ 245.940466][T21473] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 245.960447][T21473] RSP: 002b:00007f154167e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 245.968964][T21473] RAX: ffffffffffffffda RBX: 00007f154241af80 RCX: 00007f15422fbce9 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x33f7b8de}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (fail_nth: 3) [ 245.977028][T21473] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 245.985007][T21473] RBP: 00007f154167e120 R08: 0000000000000000 R09: 0000000000000000 [ 245.993044][T21473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.001033][T21473] R13: 000000000000000b R14: 00007f154241af80 R15: 00007ffd38e4db98 [ 246.009025][T21473] [ 246.016615][T21470] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 246.034672][T21498] FAULT_INJECTION: forcing a failure. [ 246.034672][T21498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 246.041253][T21471] ipvlan15: entered promiscuous mode [ 246.047864][T21498] CPU: 0 PID: 21498 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 246.062270][T21471] bridge0: port 2(ipvlan15) entered blocking state [ 246.063544][T21498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 246.063558][T21498] Call Trace: [ 246.063564][T21498] [ 246.070201][T21471] bridge0: port 2(ipvlan15) entered disabled state [ 246.080100][T21498] dump_stack_lvl+0xda/0x130 [ 246.086391][T21471] ipvlan15: entered allmulticast mode [ 246.092860][T21498] dump_stack+0x15/0x20 [ 246.097462][T21471] bridge0: entered allmulticast mode [ 246.097946][T21471] ipvlan15: left allmulticast mode [ 246.103303][T21498] should_fail_ex+0x21f/0x230 [ 246.103351][T21498] should_fail+0xb/0x10 [ 246.107492][T21471] bridge0: left allmulticast mode [ 246.112751][T21498] should_fail_usercopy+0x1a/0x20 [ 246.112818][T21498] _copy_from_user+0x1e/0xd0 [ 246.141492][T21498] do_handle_open+0x16e/0x3d0 [ 246.146248][T21498] __x64_sys_open_by_handle_at+0x46/0x50 [ 246.152050][T21498] do_syscall_64+0x44/0x110 [ 246.156574][T21498] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 246.162557][T21498] RIP: 0033:0x7f15422fbce9 [ 246.167021][T21498] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 246.186704][T21498] RSP: 002b:00007f154167e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 246.195188][T21498] RAX: ffffffffffffffda RBX: 00007f154241af80 RCX: 00007f15422fbce9 [ 246.203176][T21498] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 246.211312][T21498] RBP: 00007f154167e120 R08: 0000000000000000 R09: 0000000000000000 [ 246.219361][T21498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.227601][T21498] R13: 000000000000000b R14: 00007f154241af80 R15: 00007ffd38e4db98 14:27:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800acf) 14:27:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4001, 0x0, 0x0, 0x600000}) 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x3e5cf6e5}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (fail_nth: 4) 14:27:50 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 246.235566][T21498] [ 246.276516][T21511] FAULT_INJECTION: forcing a failure. [ 246.276516][T21511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 246.289776][T21511] CPU: 1 PID: 21511 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 246.300268][T21511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 246.310343][T21511] Call Trace: [ 246.313628][T21511] [ 246.316557][T21511] dump_stack_lvl+0xda/0x130 [ 246.321183][T21511] dump_stack+0x15/0x20 [ 246.325444][T21511] should_fail_ex+0x21f/0x230 [ 246.330366][T21511] should_fail+0xb/0x10 [ 246.334521][T21511] should_fail_usercopy+0x1a/0x20 [ 246.339633][T21511] _copy_to_user+0x1e/0x90 [ 246.344144][T21511] simple_read_from_buffer+0xa0/0x110 [ 246.349554][T21511] proc_fail_nth_read+0xfc/0x140 [ 246.354564][T21511] ? proc_fault_inject_write+0x210/0x210 [ 246.360304][T21511] vfs_read+0x1a4/0x590 [ 246.364456][T21511] ? mutex_lock+0xd/0x30 [ 246.368968][T21511] ksys_read+0xeb/0x1a0 [ 246.373143][T21511] __x64_sys_read+0x42/0x50 [ 246.377649][T21511] do_syscall_64+0x44/0x110 [ 246.382195][T21511] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 246.388353][T21511] RIP: 0033:0x7f15422fa98c [ 246.392876][T21511] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 246.412640][T21511] RSP: 002b:00007f154167e0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 246.421043][T21511] RAX: ffffffffffffffda RBX: 00007f154241af80 RCX: 00007f15422fa98c [ 246.429029][T21511] RDX: 000000000000000f RSI: 00007f154167e130 RDI: 0000000000000004 [ 246.437072][T21511] RBP: 00007f154167e120 R08: 0000000000000000 R09: 0000000000000000 [ 246.445027][T21511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.453074][T21511] R13: 000000000000000b R14: 00007f154241af80 R15: 00007ffd38e4db98 [ 246.461172][T21511] 14:27:50 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x16f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x3e9c5981}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b00) 14:27:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4100, 0x0, 0x0, 0x600000}) [ 246.473733][T21503] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 246.488087][T21512] ipvlan22: entered promiscuous mode 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x28, {0xb, 0x2}}, 0x0) 14:27:50 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x10b, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0x2, 0x2}}, 0x0) [ 246.544344][T21525] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 246.552956][T21527] ipvlan15: entered promiscuous mode [ 246.581021][T21527] bridge0: port 2(ipvlan15) entered blocking state [ 246.587818][T21527] bridge0: port 2(ipvlan15) entered disabled state 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x3f000000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4101, 0x0, 0x0, 0x600000}) [ 246.601215][T21527] ipvlan15: entered allmulticast mode [ 246.606693][T21527] bridge0: entered allmulticast mode [ 246.613078][T21527] ipvlan15: left allmulticast mode [ 246.618308][T21527] bridge0: left allmulticast mode 14:27:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b36) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x28}}, 0x0) [ 246.646943][T21532] ipvlan22: entered promiscuous mode 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x2) 14:27:50 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x250, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:50 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x40000100}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4200, 0x0, 0x0, 0x600000}) 14:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0xb) [ 246.676174][T21544] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:51 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x16f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x40000800}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0xb00) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b37) [ 246.734468][T21549] ipvlan15: entered promiscuous mode [ 246.754420][T21549] bridge0: port 2(ipvlan15) entered blocking state [ 246.761123][T21549] bridge0: port 2(ipvlan15) entered disabled state 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x1000000) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x524801fa}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x2000000) [ 246.797442][T21549] ipvlan15: entered allmulticast mode [ 246.802919][T21549] bridge0: entered allmulticast mode [ 246.814319][T21549] ipvlan15: left allmulticast mode [ 246.819721][T21549] bridge0: left allmulticast mode [ 246.824823][T21566] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0xb000000) [ 246.855868][T21562] ipvlan22: entered promiscuous mode 14:27:51 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x264, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b3a) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4201, 0x0, 0x0, 0x600000}) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x542cd9ab}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x100000000000000) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x200000000000000) [ 246.929265][T21580] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 246.946716][T21585] ipvlan15: entered promiscuous mode 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x58212286}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0xb00000000000000) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b3c) [ 246.974175][T21585] bridge0: port 2(ipvlan15) entered blocking state [ 246.980901][T21585] bridge0: port 2(ipvlan15) entered disabled state [ 246.996035][T21585] ipvlan15: entered allmulticast mode [ 247.001554][T21585] bridge0: entered allmulticast mode 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={{r2, r3/1000+60000}}) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000002000700000000000000ffff1000000000000000d3257cab8c39b7b1a92c7a44c4754fd0efcf", @ANYBLOB="079386941459f01d06cd5fdf1eb823de0b2e594dae81dbcfc5712631a9d5080fe4658ce87d940382bb299f8382e372c38aa7c363c8a54faf2b7c4115e9cba51e5e284024d763d7dd9551238024a22a4e1ce8b7cf198e25e74863ae4804e24d3270d77345d1bf95d0a736911f88402c474b8b2e8d2ff5b54a0153984c0bd8a91fe63086da4bdac136bad5010f9653ed7a9be2d2234321c261f66971911dcec17f59be358eecd2db68558f229623c36d9b7dcf79a5b185721a018cffbfd7f26996dd857da6370e285a5d26377dae3355f008a4b4596cca1b154619", @ANYBLOB="290cbe1ad892f335241b835c0886a706a29c132cc0722d483b53d34dd3e4f2e0d5d7813bed1415c8e93f688fe031f93f34e91874abecd97e863d872a4a8d3db744329a1bdd99eaf402c975c1b873", @ANYRES32=r0], 0x10000) openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x292000, 0x84, 0x20}, 0x18) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x5e28e605}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 247.019250][T21598] EXT4-fs (sda1): re-mounted 5941fea2-f5fa-4b4e-b5ef-9af118b27b95 r/w. Quota mode: none. [ 247.024015][T21585] ipvlan15: left allmulticast mode [ 247.034328][T21585] bridge0: left allmulticast mode [ 247.085592][T21593] ipvlan22: entered promiscuous mode 14:27:51 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x278, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={{r2, r3/1000+60000}}) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000002000700000000000000ffff1000000000000000d3257cab8c39b7b1a92c7a44c4754fd0efcf", @ANYBLOB="079386941459f01d06cd5fdf1eb823de0b2e594dae81dbcfc5712631a9d5080fe4658ce87d940382bb299f8382e372c38aa7c363c8a54faf2b7c4115e9cba51e5e284024d763d7dd9551238024a22a4e1ce8b7cf198e25e74863ae4804e24d3270d77345d1bf95d0a736911f88402c474b8b2e8d2ff5b54a0153984c0bd8a91fe63086da4bdac136bad5010f9653ed7a9be2d2234321c261f66971911dcec17f59be358eecd2db68558f229623c36d9b7dcf79a5b185721a018cffbfd7f26996dd857da6370e285a5d26377dae3355f008a4b4596cca1b154619", @ANYBLOB="290cbe1ad892f335241b835c0886a706a29c132cc0722d483b53d34dd3e4f2e0d5d7813bed1415c8e93f688fe031f93f34e91874abecd97e863d872a4a8d3db744329a1bdd99eaf402c975c1b873", @ANYRES32=r0], 0x10000) openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x292000, 0x84, 0x20}, 0x18) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b3f) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4300, 0x0, 0x0, 0x600000}) 14:27:51 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x37c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x647a808a}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={{r2, r3/1000+60000}}) (async) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000002000700000000000000ffff1000000000000000d3257cab8c39b7b1a92c7a44c4754fd0efcf", @ANYBLOB="079386941459f01d06cd5fdf1eb823de0b2e594dae81dbcfc5712631a9d5080fe4658ce87d940382bb299f8382e372c38aa7c363c8a54faf2b7c4115e9cba51e5e284024d763d7dd9551238024a22a4e1ce8b7cf198e25e74863ae4804e24d3270d77345d1bf95d0a736911f88402c474b8b2e8d2ff5b54a0153984c0bd8a91fe63086da4bdac136bad5010f9653ed7a9be2d2234321c261f66971911dcec17f59be358eecd2db68558f229623c36d9b7dcf79a5b185721a018cffbfd7f26996dd857da6370e285a5d26377dae3355f008a4b4596cca1b154619", @ANYBLOB="290cbe1ad892f335241b835c0886a706a29c132cc0722d483b53d34dd3e4f2e0d5d7813bed1415c8e93f688fe031f93f34e91874abecd97e863d872a4a8d3db744329a1bdd99eaf402c975c1b873", @ANYRES32=r0], 0x10000) openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x292000, 0x84, 0x20}, 0x18) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b97) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1bd5) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800000002a05cee79045186d6000000"], 0x0) [ 247.163133][T21612] ipvlan15: entered promiscuous mode [ 247.170548][T21612] bridge0: port 2(ipvlan15) entered blocking state [ 247.177387][T21612] bridge0: port 2(ipvlan15) entered disabled state [ 247.195002][T21612] ipvlan15: entered allmulticast mode [ 247.200446][T21612] bridge0: entered allmulticast mode 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1bd5) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800000002a05cee79045186d6000000"], 0x0) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x708359ca}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 247.215499][T21612] ipvlan15: left allmulticast mode [ 247.220760][T21612] bridge0: left allmulticast mode 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4301, 0x0, 0x0, 0x600000}) 14:27:51 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b98) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async, rerun: 32) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1bd5) (rerun: 32) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800000002a05cee79045186d6000000"], 0x0) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x730b0e7a}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 247.258583][T21620] ipvlan22: entered promiscuous mode 14:27:51 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4400, 0x0, 0x0, 0x600000}) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x78ab51d0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r1 = socket(0x40000000002, 0x3, 0x9) setsockopt(r1, 0xff, 0x1, 0x0, 0x32) r2 = socket(0x40000000002, 0x3, 0x9) setsockopt(r2, 0xff, 0x1, 0x0, 0x32) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="70589e8b1e7ce94d6db837b592b54f91", 0x10) bind$xdp(0xffffffffffffffff, &(0x7f0000000040)={0x2c, 0x2, r0, 0x37, r1}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b9b) 14:27:51 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) (async) r1 = socket(0x40000000002, 0x3, 0x9) setsockopt(r1, 0xff, 0x1, 0x0, 0x32) r2 = socket(0x40000000002, 0x3, 0x9) setsockopt(r2, 0xff, 0x1, 0x0, 0x32) (async) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="70589e8b1e7ce94d6db837b592b54f91", 0x10) (async) bind$xdp(0xffffffffffffffff, &(0x7f0000000040)={0x2c, 0x2, r0, 0x37, r1}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 247.350610][T21642] ipvlan15: entered promiscuous mode [ 247.357879][T21642] bridge0: port 2(ipvlan15) entered blocking state [ 247.364650][T21642] bridge0: port 2(ipvlan15) entered disabled state [ 247.372661][T21642] ipvlan15: entered allmulticast mode [ 247.378098][T21642] bridge0: entered allmulticast mode [ 247.384034][T21642] ipvlan15: left allmulticast mode [ 247.389326][T21642] bridge0: left allmulticast mode 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x7a0e0b73}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4401, 0x0, 0x0, 0x600000}) [ 247.438652][T21648] ipvlan22: entered promiscuous mode 14:27:51 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x348, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r1 = socket(0x40000000002, 0x3, 0x9) setsockopt(r1, 0xff, 0x1, 0x0, 0x32) r2 = socket(0x40000000002, 0x3, 0x9) setsockopt(r2, 0xff, 0x1, 0x0, 0x32) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="70589e8b1e7ce94d6db837b592b54f91", 0x10) bind$xdp(0xffffffffffffffff, &(0x7f0000000040)={0x2c, 0x2, r0, 0x37, r1}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) (async) socket(0x40000000002, 0x3, 0x9) (async) setsockopt(r1, 0xff, 0x1, 0x0, 0x32) (async) socket(0x40000000002, 0x3, 0x9) (async) setsockopt(r2, 0xff, 0x1, 0x0, 0x32) (async) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="70589e8b1e7ce94d6db837b592b54f91", 0x10) (async) bind$xdp(0xffffffffffffffff, &(0x7f0000000040)={0x2c, 0x2, r0, 0x37, r1}, 0x10) (async) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) open_by_handle_at(r3, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (async) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800b9d) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x7e28fced}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3b6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08008a67cc431843bca1d2bd9d0000020000000000000000000000a6bfc64f08850a7621c27e018557e3bc87d4045f8ac80ffee8c2b1e45220c07358fbc689422ff313cc75def0038f3f1528f215cd0fb7b8aba489651136670f40bc609cb839f19d1c00000f700e23a078a5b1a5ad78f6b5b1cd64def72c5c88f05ca05a5a4a918da0ec8ac51951ed73cfb0835526cfa1733ac4e159b151af9979820d3c678d1e530e"], 0x0) [ 247.521923][T21673] ipvlan15: entered promiscuous mode [ 247.530531][T21673] bridge0: port 2(ipvlan15) entered blocking state [ 247.537119][T21673] bridge0: port 2(ipvlan15) entered disabled state [ 247.551638][T21673] ipvlan15: entered allmulticast mode [ 247.557115][T21673] bridge0: entered allmulticast mode [ 247.565893][T21673] ipvlan15: left allmulticast mode 14:27:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08008a67cc431843bca1d2bd9d0000020000000000000000000000a6bfc64f08850a7621c27e018557e3bc87d4045f8ac80ffee8c2b1e45220c07358fbc689422ff313cc75def0038f3f1528f215cd0fb7b8aba489651136670f40bc609cb839f19d1c00000f700e23a078a5b1a5ad78f6b5b1cd64def72c5c88f05ca05a5a4a918da0ec8ac51951ed73cfb0835526cfa1733ac4e159b151af9979820d3c678d1e530e"], 0x0) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4500, 0x0, 0x0, 0x600000}) [ 247.571157][T21673] bridge0: left allmulticast mode 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08008a67cc431843bca1d2bd9d0000020000000000000000000000a6bfc64f08850a7621c27e018557e3bc87d4045f8ac80ffee8c2b1e45220c07358fbc689422ff313cc75def0038f3f1528f215cd0fb7b8aba489651136670f40bc609cb839f19d1c00000f700e23a078a5b1a5ad78f6b5b1cd64def72c5c88f05ca05a5a4a918da0ec8ac51951ed73cfb0835526cfa1733ac4e159b151af9979820d3c678d1e530e"], 0x0) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x81599c3e}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 247.598880][T21682] ipvlan22: entered promiscuous mode 14:27:51 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x37c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800ba0) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x86222158}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x21d8, 0x101000) ftruncate(r1, 0x1) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4501, 0x0, 0x0, 0x600000}) 14:27:51 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x863c39e8}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:51 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3c2, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x21d8, 0x101000) ftruncate(r1, 0x1) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 14:27:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4600, 0x0, 0x0, 0x600000}) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x21d8, 0x101000) ftruncate(r1, 0x1) (async) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (async) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 247.721908][T21709] ipvlan15: entered promiscuous mode 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800bde) 14:27:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)=ANY=[@ANYBLOB="bc000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000f00e0ff08000300", @ANYRES32=0x0, @ANYBLOB="0c009900040000000000000070000e0080000200ffffffffffff08021100000050505050505000000000000000000000640000000006020202020202030100040600000000000025030000002a01002d1a000000000000000000000000000000000000000000000000000072060303030303037107ff00000000000021000f0000007516000000000000f22f706bb5b92707920eef0eaf260bc7100100000000"], 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) fstat(r0, &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x24, r4, 0x400, 0x70bd2c, 0x74349402, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000081}, 0xc004) r5 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) open_by_handle_at(r5, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 247.764007][T21709] bridge0: port 2(ipvlan15) entered blocking state [ 247.770726][T21709] bridge0: port 2(ipvlan15) entered disabled state [ 247.801917][T21709] ipvlan15: entered allmulticast mode [ 247.807447][T21709] bridge0: entered allmulticast mode 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800bdf) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x865c1008}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4601, 0x0, 0x0, 0x600000}) 14:27:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)=ANY=[@ANYBLOB="bc000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000f00e0ff08000300", @ANYRES32=0x0, @ANYBLOB="0c009900040000000000000070000e0080000200ffffffffffff08021100000050505050505000000000000000000000640000000006020202020202030100040600000000000025030000002a01002d1a000000000000000000000000000000000000000000000000000072060303030303037107ff00000000000021000f0000007516000000000000f22f706bb5b92707920eef0eaf260bc7100100000000"], 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) fstat(r0, &(0x7f0000000380)) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x24, r4, 0x400, 0x70bd2c, 0x74349402, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000081}, 0xc004) (async) r5 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) open_by_handle_at(r5, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:52 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x384, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 247.813497][T21709] ipvlan15: left allmulticast mode [ 247.818747][T21709] bridge0: left allmulticast mode [ 247.834297][T21719] ipvlan22: entered promiscuous mode [ 247.891891][ T3109] ================================================================== [ 247.900102][ T3109] BUG: KCSAN: data-race in link_path_walk / shrink_dentry_list [ 247.907663][ T3109] [ 247.909983][ T3109] read-write to 0xffff888106220f00 of 4 bytes by task 21732 on cpu 0: [ 247.918490][ T3109] shrink_dentry_list+0x1c7/0x380 [ 247.923534][ T3109] shrink_dcache_sb+0x165/0x290 [ 247.928405][ T3109] reconfigure_super+0x3ef/0x580 [ 247.933358][ T3109] path_mount+0x969/0xb30 [ 247.937699][ T3109] __se_sys_mount+0x27f/0x2d0 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4700, 0x0, 0x0, 0x600000}) [ 247.942396][ T3109] __x64_sys_mount+0x67/0x80 [ 247.946998][ T3109] do_syscall_64+0x44/0x110 [ 247.951517][ T3109] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 247.957425][ T3109] [ 247.959750][ T3109] read to 0xffff888106220f00 of 4 bytes by task 3109 on cpu 1: [ 247.967294][ T3109] link_path_walk+0x4fc/0x7e0 [ 247.971984][ T3109] __filename_parentat+0x13b/0x3c0 [ 247.977111][ T3109] do_unlinkat+0x9b/0x4c0 [ 247.981455][ T3109] __x64_sys_unlink+0x30/0x40 [ 247.986149][ T3109] do_syscall_64+0x44/0x110 14:27:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)=ANY=[@ANYBLOB="bc000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000f00e0ff08000300", @ANYRES32=0x0, @ANYBLOB="0c009900040000000000000070000e0080000200ffffffffffff08021100000050505050505000000000000000000000640000000006020202020202030100040600000000000025030000002a01002d1a000000000000000000000000000000000000000000000000000072060303030303037107ff00000000000021000f0000007516000000000000f22f706bb5b92707920eef0eaf260bc7100100000000"], 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async, rerun: 64) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) (rerun: 64) fstat(r0, &(0x7f0000000380)) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x24, r4, 0x400, 0x70bd2c, 0x74349402, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000081}, 0xc004) (async) r5 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) open_by_handle_at(r5, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4701, 0x0, 0x0, 0x600000}) 14:27:52 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3cc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x8a807a64}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 247.990747][ T3109] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 247.996732][ T3109] [ 247.999052][ T3109] value changed: 0x00280400 -> 0x00200000 [ 248.004842][ T3109] [ 248.007146][ T3109] Reported by Kernel Concurrency Sanitizer on: [ 248.013275][ T3109] CPU: 1 PID: 3109 Comm: syz-executor.3 Not tainted 6.7.0-rc6-syzkaller-00176-g24e0d2e527a3 #0 [ 248.023669][ T3109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 248.033799][ T3109] ================================================================== 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82100, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) syz_io_uring_setup(0x24fa, &(0x7f0000000100)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0}}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_WRITEV={0x2, 0x21, 0x6000, @fd_index=0x3, 0x4, &(0x7f0000000100)=[{&(0x7f0000000040)="8775b70d15fdb3e808627bd475166f67800dd663273809f31af2c22fba63ce512fee67f38863824352c042dac9975a2b6213b4f1dea5fed4e7678eba8e928d360057daf228cac408d7934b325acf2ba8448cbfe64aea2446016a074d5b585d6eddf8810d86155d792f2570dd9745335b0ec8d7b17023fb3bbdf602d427e69c8f81418d54ee578c6ffdfa05561e739f51ddc6b0e5f795790ebc15caacf90f152268e2e851aebccf4e0cc8efebbc932e9137f62decb97cce367506718554f11f", 0xbf}], 0x1, 0x2, 0x0, {0x0, r4}}) 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800be2) [ 248.086935][T21755] ipvlan22: entered promiscuous mode 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x8aefd01c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82100, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) syz_io_uring_setup(0x24fa, &(0x7f0000000100)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0}}) (async, rerun: 64) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) (rerun: 64) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_WRITEV={0x2, 0x21, 0x6000, @fd_index=0x3, 0x4, &(0x7f0000000100)=[{&(0x7f0000000040)="8775b70d15fdb3e808627bd475166f67800dd663273809f31af2c22fba63ce512fee67f38863824352c042dac9975a2b6213b4f1dea5fed4e7678eba8e928d360057daf228cac408d7934b325acf2ba8448cbfe64aea2446016a074d5b585d6eddf8810d86155d792f2570dd9745335b0ec8d7b17023fb3bbdf602d427e69c8f81418d54ee578c6ffdfa05561e739f51ddc6b0e5f795790ebc15caacf90f152268e2e851aebccf4e0cc8efebbc932e9137f62decb97cce367506718554f11f", 0xbf}], 0x1, 0x2, 0x0, {0x0, r4}}) [ 248.128222][T21750] ipvlan15: entered promiscuous mode [ 248.137648][T21750] bridge0: port 2(ipvlan15) entered blocking state [ 248.144382][T21750] bridge0: port 2(ipvlan15) entered disabled state [ 248.161919][T21750] ipvlan15: entered allmulticast mode [ 248.167349][T21750] bridge0: entered allmulticast mode 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x91100000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800be4) [ 248.174304][T21750] ipvlan15: left allmulticast mode [ 248.179482][T21750] bridge0: left allmulticast mode 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4800, 0x0, 0x0, 0x600000}) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82100, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (async) syz_io_uring_setup(0x24fa, &(0x7f0000000100)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0}}) (async) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_WRITEV={0x2, 0x21, 0x6000, @fd_index=0x3, 0x4, &(0x7f0000000100)=[{&(0x7f0000000040)="8775b70d15fdb3e808627bd475166f67800dd663273809f31af2c22fba63ce512fee67f38863824352c042dac9975a2b6213b4f1dea5fed4e7678eba8e928d360057daf228cac408d7934b325acf2ba8448cbfe64aea2446016a074d5b585d6eddf8810d86155d792f2570dd9745335b0ec8d7b17023fb3bbdf602d427e69c8f81418d54ee578c6ffdfa05561e739f51ddc6b0e5f795790ebc15caacf90f152268e2e851aebccf4e0cc8efebbc932e9137f62decb97cce367506718554f11f", 0xbf}], 0x1, 0x2, 0x0, {0x0, r4}}) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x92100000}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3e4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800be7) 14:27:52 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8a040, 0x1) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="9be1527375fd9c04a61e1c3ba99244d1785f1f1efd1478c376f756e3ccbb75043554349d47d68f4f80247be312d289ffc8f84dadd4c7953adf103c186a8f5f8dcdb6a40d8f82eb4f3e8268fe7e4916ed141add4c5cc1312027c1aac4841e37b4f1b3897078de123246704e861c086c3867923a7f13e49f65717722736be61cd223914ddf6e9e652e53535f6866b1e2cdcea9160016b52dbf14c9551b2124f827ef8af1892a85ed3b5525ca9d89a832d79d5b0af114241d3c5f268189db6e901d21f3a56f4eb542c474813b861ece83151fda7841e9c4b07f28d49abc3d4dfc"], 0x0) [ 248.272499][T21784] ipvlan22: entered promiscuous mode 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xa11c80ce}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8a040, 0x1) (async) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="9be1527375fd9c04a61e1c3ba99244d1785f1f1efd1478c376f756e3ccbb75043554349d47d68f4f80247be312d289ffc8f84dadd4c7953adf103c186a8f5f8dcdb6a40d8f82eb4f3e8268fe7e4916ed141add4c5cc1312027c1aac4841e37b4f1b3897078de123246704e861c086c3867923a7f13e49f65717722736be61cd223914ddf6e9e652e53535f6866b1e2cdcea9160016b52dbf14c9551b2124f827ef8af1892a85ed3b5525ca9d89a832d79d5b0af114241d3c5f268189db6e901d21f3a56f4eb542c474813b861ece83151fda7841e9c4b07f28d49abc3d4dfc"], 0x0) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xa9f8bed6}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c00) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8a040, 0x1) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="9be1527375fd9c04a61e1c3ba99244d1785f1f1efd1478c376f756e3ccbb75043554349d47d68f4f80247be312d289ffc8f84dadd4c7953adf103c186a8f5f8dcdb6a40d8f82eb4f3e8268fe7e4916ed141add4c5cc1312027c1aac4841e37b4f1b3897078de123246704e861c086c3867923a7f13e49f65717722736be61cd223914ddf6e9e652e53535f6866b1e2cdcea9160016b52dbf14c9551b2124f827ef8af1892a85ed3b5525ca9d89a832d79d5b0af114241d3c5f268189db6e901d21f3a56f4eb542c474813b861ece83151fda7841e9c4b07f28d49abc3d4dfc"], 0x0) [ 248.313435][T21783] ipvlan15: entered promiscuous mode [ 248.321560][T21783] bridge0: port 2(ipvlan15) entered blocking state [ 248.328277][T21783] bridge0: port 2(ipvlan15) entered disabled state [ 248.335769][T21783] ipvlan15: entered allmulticast mode [ 248.341216][T21783] bridge0: entered allmulticast mode [ 248.349021][T21783] ipvlan15: left allmulticast mode [ 248.354192][T21783] bridge0: left allmulticast mode 14:27:52 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000000)={{0xda, 0x20}, {0x7, 0x6}, 0x53f2, 0x3, 0xd6}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4801, 0x0, 0x0, 0x600000}) 14:27:52 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x500, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3c2, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4900, 0x0, 0x0, 0x600000}) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xabd92c54}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000000)={{0xda, 0x20}, {0x7, 0x6}, 0x53f2, 0x3, 0xd6}) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c2d) 14:27:52 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000000)={{0xda, 0x20}, {0x7, 0x6}, 0x53f2, 0x3, 0xd6}) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 248.484690][T21819] ipvlan22: entered promiscuous mode 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xae68b124}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x800, 0x51) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000020000002600000002000000"], 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = signalfd4(r2, &(0x7f0000000080)={[0x1c57]}, 0x8, 0xc0000) r6 = socket(0x40000000002, 0x3, 0x9) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x1f, @remote, 0x3}}, 0x32c9, 0x8}, &(0x7f00000001c0)=0x90) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/keyboard', 0x100, 0x4b) r8 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x22500, 0x124, 0x13}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000180)=[r4, r5, r0, r7, r8, 0xffffffffffffffff], 0x6) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x800, 0x51) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000020000002600000002000000"], 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = signalfd4(r2, &(0x7f0000000080)={[0x1c57]}, 0x8, 0xc0000) r6 = socket(0x40000000002, 0x3, 0x9) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x1f, @remote, 0x3}}, 0x32c9, 0x8}, &(0x7f00000001c0)=0x90) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/keyboard', 0x100, 0x4b) r8 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x22500, 0x124, 0x13}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000180)=[r4, r5, r0, r7, r8, 0xffffffffffffffff], 0x6) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) dup2(r0, r0) (async) openat(r1, &(0x7f0000000000)='./file0\x00', 0x800, 0x51) (async) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000020000002600000002000000"], 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) signalfd4(r2, &(0x7f0000000080)={[0x1c57]}, 0x8, 0xc0000) (async) socket(0x40000000002, 0x3, 0x9) (async) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) (async) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x1f, @remote, 0x3}}, 0x32c9, 0x8}, &(0x7f00000001c0)=0x90) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/keyboard', 0x100, 0x4b) (async) openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x22500, 0x124, 0x13}, 0x18) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000180)=[r4, r5, r0, r7, r8, 0xffffffffffffffff], 0x6) (async) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xb0cee002}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 248.553245][T21817] ipvlan15: entered promiscuous mode [ 248.567468][T21817] bridge0: port 2(ipvlan15) entered blocking state [ 248.574157][T21817] bridge0: port 2(ipvlan15) entered disabled state [ 248.581824][T21817] ipvlan15: entered allmulticast mode [ 248.587398][T21817] bridge0: entered allmulticast mode [ 248.593652][T21817] ipvlan15: left allmulticast mode 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c30) [ 248.598884][T21817] bridge0: left allmulticast mode 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x800, 0x51) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000020000002600000002000000"], 0x0) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = signalfd4(r2, &(0x7f0000000080)={[0x1c57]}, 0x8, 0xc0000) r6 = socket(0x40000000002, 0x3, 0x9) setsockopt(r6, 0xff, 0x1, 0x0, 0x32) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x1f, @remote, 0x3}}, 0x32c9, 0x8}, &(0x7f00000001c0)=0x90) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/keyboard', 0x100, 0x4b) r8 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x22500, 0x124, 0x13}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000180)=[r4, r5, r0, r7, r8, 0xffffffffffffffff], 0x6) 14:27:52 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3c6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xb35191ea}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4901, 0x0, 0x0, 0x600000}) 14:27:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c32) 14:27:52 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x600, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000a812f6507d868e8e2999ac037eaee80c020000000b0000000200000012c16e8fcaad37fcc8e07f38e3991780a53a78a7e4cc7eb7adae8e2216331dc63ee20105c3b464d0864d446ed5e56bf02da360bb"], 0x0) 14:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000a812f6507d868e8e2999ac037eaee80c020000000b0000000200000012c16e8fcaad37fcc8e07f38e3991780a53a78a7e4cc7eb7adae8e2216331dc63ee20105c3b464d0864d446ed5e56bf02da360bb"], 0x0) [ 248.710089][T21861] ipvlan22: entered promiscuous mode 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xb9faf9e6}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000a812f6507d868e8e2999ac037eaee80c020000000b0000000200000012c16e8fcaad37fcc8e07f38e3991780a53a78a7e4cc7eb7adae8e2216331dc63ee20105c3b464d0864d446ed5e56bf02da360bb"], 0x0) [ 248.750624][T21863] ipvlan15: entered promiscuous mode [ 248.761146][T21863] bridge0: port 2(ipvlan15) entered blocking state [ 248.767831][T21863] bridge0: port 2(ipvlan15) entered disabled state [ 248.774791][T21863] ipvlan15: entered allmulticast mode [ 248.780258][T21863] bridge0: entered allmulticast mode 14:27:53 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x1}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x8000, 0x103) open_by_handle_at(r1, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xca409de6}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c35) [ 248.799567][T21863] ipvlan15: left allmulticast mode [ 248.804833][T21863] bridge0: left allmulticast mode 14:27:53 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x1}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x8000, 0x103) open_by_handle_at(r1, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) (async) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x1}}, 0x10) (async) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x8000, 0x103) (async) open_by_handle_at(r1, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (async) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4a00, 0x0, 0x0, 0x600000}) 14:27:53 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c65) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xca598370}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3c8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x1}}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x8000, 0x103) open_by_handle_at(r1, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08010000020000000b00d17d6f1a21ebe0aba833f15dd7ca0000020000008612812dca3a9f59edc5233b3ab762fedf7889c6286fc31a99ac07b8c648e964718d88b72b07dd8cb1b010cd4a1a87c2de12ca2e0fdd632d64b521c019dff795954274bfada53bacc8546bac7d7100c15b9eb663791d364905eec88e5572997a7c78307cb3782f36d766"], 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x7f, 0xff, 0x401, 0x8}}, 0x400000) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xce801ca1}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 248.910588][T21896] ipvlan22: entered promiscuous mode 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c68) 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08010000020000000b00d17d6f1a21ebe0aba833f15dd7ca0000020000008612812dca3a9f59edc5233b3ab762fedf7889c6286fc31a99ac07b8c648e964718d88b72b07dd8cb1b010cd4a1a87c2de12ca2e0fdd632d64b521c019dff795954274bfada53bacc8546bac7d7100c15b9eb663791d364905eec88e5572997a7c78307cb3782f36d766"], 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x7f, 0xff, 0x401, 0x8}}, 0x400000) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xd051ab78}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 248.959504][T21902] ipvlan15: entered promiscuous mode [ 248.974311][T21902] bridge0: port 2(ipvlan15) entered blocking state [ 248.980979][T21902] bridge0: port 2(ipvlan15) entered disabled state [ 248.994474][T21902] ipvlan15: entered allmulticast mode [ 248.999942][T21902] bridge0: entered allmulticast mode 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08010000020000000b00d17d6f1a21ebe0aba833f15dd7ca0000020000008612812dca3a9f59edc5233b3ab762fedf7889c6286fc31a99ac07b8c648e964718d88b72b07dd8cb1b010cd4a1a87c2de12ca2e0fdd632d64b521c019dff795954274bfada53bacc8546bac7d7100c15b9eb663791d364905eec88e5572997a7c78307cb3782f36d766"], 0x0) (async) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x7f, 0xff, 0x401, 0x8}}, 0x400000) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4a01, 0x0, 0x0, 0x600000}) 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c6a) 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 249.005844][T21902] ipvlan15: left allmulticast mode [ 249.011032][T21902] bridge0: left allmulticast mode 14:27:53 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x900, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3cc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xd6bef8a9}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4b00, 0x0, 0x0, 0x600000}) 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) [ 249.105854][T21930] ipvlan22: entered promiscuous mode 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800c6d) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xdeb8f733}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r5, 0x8008f511, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 249.149341][T21937] ipvlan15: entered promiscuous mode 14:27:53 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa00, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xe5f65c3e}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4b01, 0x0, 0x0, 0x600000}) [ 249.185125][T21937] bridge0: port 2(ipvlan15) entered blocking state [ 249.191725][T21937] bridge0: port 2(ipvlan15) entered disabled state [ 249.203057][T21937] ipvlan15: entered allmulticast mode [ 249.208478][T21937] bridge0: entered allmulticast mode [ 249.216873][T21937] ipvlan15: left allmulticast mode [ 249.222063][T21937] bridge0: left allmulticast mode 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r5, 0x8008f511, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') (async) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r5, 0x8008f511, &(0x7f0000000000)) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) [ 249.250305][T21952] ipvlan22: entered promiscuous mode 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800cb4) 14:27:53 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3d8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xe69d40ca}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r5, 0x8008f511, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0x2}}, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') (async) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7f, 0x37}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x5}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x10}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040c1}, 0x20000000) (async) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r5, 0x8008f511, &(0x7f0000000000)) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4c00, 0x0, 0x0, 0x600000}) 14:27:53 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xada, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 249.325174][T21969] ipvlan15: entered promiscuous mode [ 249.340775][T21969] bridge0: port 2(ipvlan15) entered blocking state [ 249.347431][T21969] bridge0: port 2(ipvlan15) entered disabled state 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800cb7) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xe6f9fab9}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800e1ff020000000b00000002000000"], 0x0) [ 249.374352][T21969] ipvlan15: entered allmulticast mode [ 249.379906][T21969] bridge0: entered allmulticast mode [ 249.395938][T21969] ipvlan15: left allmulticast mode [ 249.401187][T21969] bridge0: left allmulticast mode 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xe8393c86}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800cb9) [ 249.435422][T21980] ipvlan22: entered promiscuous mode 14:27:53 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3e4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800e1ff020000000b00000002000000"], 0x0) (async) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800e1ff020000000b00000002000000"], 0x0) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4c01, 0x0, 0x0, 0x600000}) 14:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800e1ff020000000b00000002000000"], 0x0) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xea9151b3}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb00, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x80000, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r3, 0x8, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0xbe00, 0x2b}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4080}, 0x8011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x1, 0x94c}, 0x80, 0x6}}, 0x0) [ 249.502088][T22003] ipvlan15: entered promiscuous mode [ 249.512150][T22003] bridge0: port 2(ipvlan15) entered blocking state [ 249.518987][T22003] bridge0: port 2(ipvlan15) entered disabled state [ 249.538839][T22003] ipvlan15: entered allmulticast mode [ 249.544267][T22003] bridge0: entered allmulticast mode 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800cbc) 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) (async) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x80000, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r3, 0x8, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0xbe00, 0x2b}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4080}, 0x8011) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x1, 0x94c}, 0x80, 0x6}}, 0x0) 14:27:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4d00, 0x0, 0x0, 0x600000}) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xedfc287e}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x500, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 249.571656][T22003] ipvlan15: left allmulticast mode [ 249.576837][T22003] bridge0: left allmulticast mode [ 249.607204][T22016] ipvlan22: entered promiscuous mode 14:27:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x50, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000008c0)={0xbc, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4}}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x70, 0xe, {@wo_ht={{}, {0x2}, @broadcast}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff}}, @void}}, @NL80211_ATTR_BEACON_TAIL={0x21, 0xf, [@random, @peer_mgmt={0x75, 0x16, {0x0, 0x0, @void, @val, @val="f22f706bb5b92707920eef0eaf260bc7"}}, @challenge={0x10, 0x1}]}]]}, 0xbc}}, 0x8040) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x4) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x80000, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r3, 0x8, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0xbe00, 0x2b}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4080}, 0x8011) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x8, &(0x7f0000000180)="deff002500bff0ab38be0066021d", &(0x7f0000000300)=""/8, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x1, 0x94c}, 0x80, 0x6}}, 0x0) 14:27:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800ce2) 14:27:53 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb01, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 249.682020][T22030] ipvlan15: entered promiscuous mode 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xf419b002}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:53 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xf4f579fd}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) [ 249.705804][T22030] bridge0: port 2(ipvlan15) entered blocking state [ 249.712555][T22030] bridge0: port 2(ipvlan15) entered disabled state [ 249.724514][T22030] ipvlan15: entered allmulticast mode [ 249.730126][T22030] bridge0: entered allmulticast mode [ 249.740162][T22030] ipvlan15: left allmulticast mode [ 249.746015][T22030] bridge0: left allmulticast mode 14:27:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4d01, 0x0, 0x0, 0x600000}) 14:27:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800ce5) 14:27:54 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x600, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 249.761241][T22041] ipvlan22: entered promiscuous mode 14:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@orangefs={0x14, 0x1, {"2a9f8c091e0257c0e0ce382faa0b8275", 0x81}}, 0x0) 14:27:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@orangefs={0x14, 0x1, {"2a9f8c091e0257c0e0ce382faa0b8275", 0x81}}, 0x0) 14:27:54 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xfa014852}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:54 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb18, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 249.828129][T22054] ipvlan15: entered promiscuous mode [ 249.835898][T22054] bridge0: port 2(ipvlan15) entered blocking state [ 249.842589][T22054] bridge0: port 2(ipvlan15) entered disabled state [ 249.862412][T22054] ipvlan15: entered allmulticast mode [ 249.867844][T22054] bridge0: entered allmulticast mode 14:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@orangefs={0x14, 0x1, {"2a9f8c091e0257c0e0ce382faa0b8275", 0x81}}, 0x0) 14:27:54 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xfd79f5f4}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 14:27:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800ce7) 14:27:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4e00, 0x0, 0x0, 0x600000}) [ 249.876763][T22054] ipvlan15: left allmulticast mode [ 249.882078][T22054] bridge0: left allmulticast mode [ 249.920012][T22064] ipvlan22: entered promiscuous mode 14:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 14:27:54 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xfeffffff}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:54 executing program 3: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80805, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 14:27:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800cea) 14:27:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 14:27:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000001f0000000000000001800000ad521800f0ffffff18400000fbffffff0000000000000000186a0000060000000000000002e0ff00851000000700000085100000faffffff1811000092", @ANYRES32, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xec, &(0x7f00000001c0)=""/236, 0x40f00, 0x10, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f00000002c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x8000000, 0x8}, 0x10, 0xf6f1, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r3], 0x0, 0x10, 0xffffffff}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="69705f7674693000000000e5ffff", @ANYRES32, @ANYBLOB="16c91a"]}) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001780)={0x4e01, 0x0, 0x0, 0x600000}) 14:27:54 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'pimreg1\x00'}) 14:27:54 executing program 1: socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc00, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 250.010917][T22085] ipvlan15: entered promiscuous mode [ 250.030460][T22085] bridge0: port 2(ipvlan15) entered blocking state [ 250.037075][T22085] bridge0: port 2(ipvlan15) entered disabled state 14:27:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa4826, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8d428, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187815, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x100800d00) 14:27:54 executing program 4: socket(0x0, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb, 0xfffffffe}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) 14:27:54 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0xc) (async)