}]}, 0x2c}}, 0x0) executing program 1: syz_emit_ethernet(0x96, &(0x7f0000000740)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x1b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast2, {[@lsrr={0x83, 0x3}, @cipso={0x86, 0x2e, 0x0, [{0x0, 0xd, "8fbf01fc382acd5c113fe7"}, {0x0, 0x2}, {0x0, 0x3, "cc"}, {0x0, 0xd, "1cddf54f68ebf2e1320b04"}, {0x0, 0x5, "a96f7d"}, {0x0, 0x4, "c768"}]}, @cipso={0x86, 0x24, 0x0, [{0x0, 0xf, "b4a05fd3e9ddb21c5a0ac08ef4"}, {0x0, 0xf, "3d5663b7bdb15d7ed6d6e35b24"}]}]}}}}}}}, 0x0) executing program 2: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = fsopen(&(0x7f0000000100)='devtmpfs\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@private, @local}, &(0x7f0000000140)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r2, 0x0, 0x0, 0x0, &(0x7f0000000880)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x24) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x6, 0x0, 0x1, 0x1}, 0x48) r3 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) getpgrp(0x0) unlinkat(r3, &(0x7f00000002c0)='./file0\x00', 0x0) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x2, 0xa, 0x409}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x3, 0x0, 0x0, {0x2}}], {0x14}}, 0x50}}, 0x0) [ 330.952886][T17509] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 330.975582][T17497] vhci_hcd: invalid port number 97 [ 330.980795][T17497] vhci_hcd: default hub control req: d364 v6665 i0061 l29804 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = fsopen(&(0x7f0000000100)='devtmpfs\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@private, @local}, &(0x7f0000000140)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r2, 0x0, 0x0, 0x0, &(0x7f0000000880)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x24) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x6, 0x0, 0x1, 0x1}, 0x48) r3 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) getpgrp(0x0) unlinkat(r3, &(0x7f00000002c0)='./file0\x00', 0x0) executing program 0: mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000000, [{0xc}, {}, {}]}]}}, &(0x7f0000000f40)=""/4096, 0x3e, 0x1000, 0x9}, 0x20) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) io_destroy(r0) io_destroy(r0) executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x8925, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b4000000000000006111140000000000040000000000000095000000000000001abe5201462857a3db65e291772afa2114f5963ed660b870d974d2252829f8290f8d02e3b0096b3df3e6585851cb7efb50a982b66e14716ffe33a164c3d1ff5798fc4bd6d3e5ab096e9ad743eb00"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d43, 0x10, &(0x7f0000000000), 0x76}, 0x48) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0, r2}, 0x40) executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000200)=@v3, 0x18, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[], 0x58) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) [ 331.016861][T17519] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=34 sclass=netlink_tcpdiag_socket pid=17519 comm=syz-executor.4 [ 331.046649][T17519] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x2, 0xa, 0x409}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x3, 0x0, 0x0, {0x2}}], {0x14}}, 0x50}}, 0x0) executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@cgroup, 0xffffffffffffffff, 0x20, 0x0, 0xffffffffffffffff, @link_id, r0}, 0x20) executing program 1: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) write$binfmt_script(r1, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x2, 0xa, 0x409}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x3, 0x0, 0x0, {0x2}}], {0x14}}, 0x50}}, 0x0) executing program 2: iopl(0x3) futex(&(0x7f0000000040), 0xc, 0x1, 0x0, &(0x7f0000000300), 0x0) executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@delpolicy={0x68, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc0, 0xa0}}, [@mark={0xc}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x68}}, 0x0) executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x1}]}, {0x0, [0x61, 0xe]}}, 0x0, 0x28}, 0x20) executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000200)=@v3, 0x18, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[], 0x58) executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x40042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0) msync(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x4) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000780)=@ipv6_newnexthop={0x18, 0x68, 0x1}, 0x18}}, 0x0) executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc]}, &(0x7f0000000100)='GPL\x00', 0x8, 0x30, &(0x7f0000000140)=""/48}, 0x90) executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x953a, &(0x7f0000000100)=[{&(0x7f0000000000)="3a10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) executing program 2: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x13) [ 331.346903][ T10] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0xe) ioctl$TIOCVHANGUP(r3, 0x5437, 0x5) executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000c40), 0x0, 0xeb82) r1 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0) io_submit(r1, 0x2, &(0x7f0000001140)=[&(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001240)={0x0, 0x3000003, &(0x7f0000000080)={&(0x7f0000000100)={0x64, 0x2, 0x6, 0x5, 0xa, 0x500, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x6, 0x0}, @IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_PORT_TO={0x6}]}]}, 0x64}}, 0x0) executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents(r0, &(0x7f00000001c0)=""/90, 0x5a) getdents(r0, 0xffffffffffffffff, 0x18) executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000040)=0x8) executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents(r0, &(0x7f00000001c0)=""/90, 0x5a) getdents(r0, 0xffffffffffffffff, 0x18) executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000004300), 0x0, 0x1) ppoll(&(0x7f0000004340)=[{r0}], 0x1, &(0x7f0000004380), 0x0, 0x0) executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5385, &(0x7f0000000000)) executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="be", 0x1}], 0x1, 0x1000, 0x0) executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x7}, 0x5e) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0), 0x69) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002f00000036000000000005009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x0, 0x35, 0xb2, &(0x7f0000000b40)="3487188b17b83a1bceb0a4291273fee0dd76ce28a412b233570f9b2a7fd7b26f34647a3883b87f2187fccd4f35a681d0d7f80bd210557bcfd732f331c1e52da8631fe9a875ed91ecd1921be5cca6c4d59b7baf5b1c90e118f56992b394b33a331fd21957509290cc4e235cd7c37fa40052795b2483decfb7db6a8b240ab85403166195f08f1a3b3719409a9b7383aba1fbc1c9a5c8952fad5e057bfa0645fc1406324780484cc75d725e79f8326a058507910e4960a34bf28c5629c8dd4222e43bdd98d7d36d9da984a4bffe342a7103fdb765c9faca0659c89d576888b99ac672b65f13", &(0x7f0000000a80)=""/178, 0x0, 0x0, 0xb2, 0xa5, &(0x7f00000007c0)="b520610c75311127840b58a6e774c99d77a2786b5e40e99889424fbfc0176e825cd85cc8f395cc354a00ece16e23cd51984ae79fe0c634560c8f464090ce6439af15b4b269d3c63de01fb868c4ab750db87f3cc40f48caf494b88d4d332dcdad4a30b6d5f0c4a12a74a2d9d5600fa499513a6fa2fb6e973865e244bef4ba9c1290e7442c310436080fcaef33c26eab89dcd4237911034b8003ac93f1c2867de6b54ea530fa73610bbf08f1001b0ee02c0e68", &(0x7f0000000280)="4594193652f8997f4d29b3e8405a4466c300c63ff495e8c50c594b8d6d810087ac1dedc27528541a8b7d1eb0272035752624cf47d2ec5be8a5f08e8d45b19091ceb83a4f2665d95c616ca53641eaa5f607aa8619659f9dfc324ad0988188708276ac86c6ed8f5fe1a0bfdd5e8fa42bccb29234405ced7db7ca0f4a70f7d56a2b67c8a2f9aa1007b42a8e08ca54e01a0c96f169c16c46c1842cbc02ce3d2044acf47c43000000000000000000", 0x0, 0x1ff}, 0x28) executing program 1: mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000000, [{0xc}, {}, {}]}]}}, &(0x7f0000000f40)=""/4096, 0x3e, 0x1000, 0x9}, 0x20) [ 334.693077][T17634] loop2: detected capacity change from 0 to 256 executing program 0: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ipvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x7c}, {0x3c}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000002c000000030a010200000000000000000100001a0900010073797a30000000000900030073797a3100000000780000001a0a010400000000000000000100000008000b4000000000500004"], 0x10c}}, 0x0) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000240)=""/4096}, 0x80) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r1, r2, 0x5}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x40000000, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4, @tid=r0}, 0x0) executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0ff5b14104fe62cc60e413905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf2364149215108333719acd97cfa107d40224edc5465a93df8513a32ec450bebc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c9"], 0x0}, 0x90) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000006000100000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0}, 0x90) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000800000003003c02ffffffef3501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) io_setup(0x1f, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000001140)=[&(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) executing program 2: prctl$PR_MCE_KILL(0x23, 0x1, 0x7fffffffeffe) executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000001040)={'ip_vti0\x00', &(0x7f0000000080)={'ip_vti0\x00', 0x0}}) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x1a, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@printk={@lld}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @map_idx_val={0x18, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x15, 0x38, &(0x7f0000000940)=""/56, 0x41000, 0x30, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0x3, 0x7c9, 0x100}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r2}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r4, 0x0, 0x100000005) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x13, &(0x7f0000000180)=@ringbuf={{}, {}, {}, [@ringbuf_query]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) write$binfmt_script(r10, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r10, 0x0) setsockopt$packet_fanout_data(r9, 0x107, 0x16, &(0x7f0000000100)={0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x5, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7, 0x2}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0xd, 0x4}, {0x10, 0x2}, {0x10, 0x4}, {0xe, 0x5}, {0x6, 0x2}, {0x9}, {0xb, 0x3}, {0x0, 0x2}]}, @fwd={0x3}, @struct={0x1, 0x4, 0x0, 0x4, 0x1, 0x97, [{0x2, 0x4, 0x1}, {0x4, 0x5, 0x5}, {0x1, 0x0, 0x1}, {0xb, 0x1, 0x68}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x4}]}, @restrict={0xb, 0x0, 0x0, 0xb, 0x4}, @restrict={0x7}]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/205, 0x109, 0xcd, 0x0, 0x5}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='net_prio.prioidx\x00', 0x0, 0x0) close(r7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580), &(0x7f00000005c0)='%ps \x00'}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000300)=0x40) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) [ 334.800956][T17658] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 334.809273][T17658] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000400)=[{0x7c}, {0x3c}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ipvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000002c000000030a010200000000000000000100001a0900010073797a30000000000900030073797a3100000000780000001a0a010400000000000000000100000008000b4000000000500004"], 0x10c}}, 0x0) executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89f4, &(0x7f0000000000)={'team0\x00'}) executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x40000000, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4, @tid=r0}, 0x0) executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x24, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp={0xd, 0x0, 0x0, 0x1, 0x7, 0x1ff, 0xf3c, 0xea}}}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) r2 = syz_io_uring_setup(0x24f9, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x46f7db5bd1d56d71}) r6 = dup(r2) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) io_uring_enter(r6, 0x22, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r9 = socket$can_j1939(0x1d, 0x2, 0x7) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000100)={0x1d, r11}, 0x18) sendmsg$can_j1939(r9, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18, &(0x7f0000000080)={&(0x7f00000001c0)="b8", 0x1}, 0x4}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x868, 0x0, @perf_config_ext={0x1}, 0x9062, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x3cca, 0x4) sendmsg$can_raw(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{}, 0x0, 0x0, 0x0, 0x0, "d53495ed19ac6f39"}, 0x10}}, 0x0) ppoll(&(0x7f0000002840)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) [ 334.902090][T17682] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 334.910300][T17682] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) pipe2$9p(&(0x7f0000000100), 0x84800) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=@base={0x5, 0x2, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x7, r0}, 0x83) executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ipvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x24, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp={0xd, 0x0, 0x0, 0x1, 0x7, 0x1ff, 0xf3c, 0xea}}}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) r2 = syz_io_uring_setup(0x24f9, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x46f7db5bd1d56d71}) r6 = dup(r2) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) io_uring_enter(r6, 0x22, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r9 = socket$can_j1939(0x1d, 0x2, 0x7) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000100)={0x1d, r11}, 0x18) sendmsg$can_j1939(r9, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18, &(0x7f0000000080)={&(0x7f00000001c0)="b8", 0x1}, 0x4}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x868, 0x0, @perf_config_ext={0x1}, 0x9062, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000001040)={'ip_vti0\x00', &(0x7f0000000080)={'ip_vti0\x00', 0x0}}) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x1a, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@printk={@lld}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @map_idx_val={0x18, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x15, 0x38, &(0x7f0000000940)=""/56, 0x41000, 0x30, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0x3, 0x7c9, 0x100}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r2}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r4, 0x0, 0x100000005) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x13, &(0x7f0000000180)=@ringbuf={{}, {}, {}, [@ringbuf_query]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) write$binfmt_script(r10, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r10, 0x0) setsockopt$packet_fanout_data(r9, 0x107, 0x16, &(0x7f0000000100)={0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x5, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7, 0x2}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0xd, 0x4}, {0x10, 0x2}, {0x10, 0x4}, {0xe, 0x5}, {0x6, 0x2}, {0x9}, {0xb, 0x3}, {0x0, 0x2}]}, @fwd={0x3}, @struct={0x1, 0x4, 0x0, 0x4, 0x1, 0x97, [{0x2, 0x4, 0x1}, {0x4, 0x5, 0x5}, {0x1, 0x0, 0x1}, {0xb, 0x1, 0x68}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x4}]}, @restrict={0xb, 0x0, 0x0, 0xb, 0x4}, @restrict={0x7}]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/205, 0x109, 0xcd, 0x0, 0x5}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='net_prio.prioidx\x00', 0x0, 0x0) close(r7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580), &(0x7f00000005c0)='%ps \x00'}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000b0db000000000000000000850000000e000000d50000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f00000000c0)={0x9}, 0x10) write(r1, &(0x7f0000000040)="240000001a005f0014f9f507000909000a00000000000000010000000800020000000000", 0x24) [ 334.943298][T17687] vxcan0: tx drop: invalid da for name 0x0000000000000002 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x3cca, 0x4) sendmsg$can_raw(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{}, 0x0, 0x0, 0x0, 0x0, "d53495ed19ac6f39"}, 0x10}}, 0x0) ppoll(&(0x7f0000002840)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x24, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp={0xd, 0x0, 0x0, 0x1, 0x7, 0x1ff, 0xf3c, 0xea}}}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) r2 = syz_io_uring_setup(0x24f9, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x46f7db5bd1d56d71}) r6 = dup(r2) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) io_uring_enter(r6, 0x22, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r9 = socket$can_j1939(0x1d, 0x2, 0x7) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000100)={0x1d, r11}, 0x18) sendmsg$can_j1939(r9, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18, &(0x7f0000000080)={&(0x7f00000001c0)="b8", 0x1}, 0x4}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x868, 0x0, @perf_config_ext={0x1}, 0x9062, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) [ 335.010180][T17700] vxcan0: tx drop: invalid da for name 0x0000000000000002 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x40000000, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4, @tid=r0}, 0x0) executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x800000010d, 0x2, &(0x7f0000000b00)="c94e2f10996dd831ed733390a280fd2ccb19e797e2817cbf9188c9f51bfedb18586a4b1816cf773b2ce0017e70ef53f90b301d0929558b8ede4ae2fd219ac09d8d42041c9e4bed1c4403d12b8e8094d651361178896c7a3782e361bb506fe35a3e2a2fa6e87075df473c00000000000000000000000000000081b7a6d7c499b47d", 0x81) executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) setrlimit(0x2, &(0x7f0000000000)) prctl$PR_SET_MM(0x23, 0x8, &(0x7f00001f4000/0x1000)=nil) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}}, 0x0) executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000002200000c0000000000feff00760000000f00000045000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00'}, 0x10) fsopen(0x0, 0x0) syz_open_dev$sg(0x0, 0x3, 0x4c441) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x40902) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_uring_setup(0x1de0, &(0x7f0000000440)) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) [ 335.064074][T17706] vxcan0: tx drop: invalid da for name 0x0000000000000002 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000001040)={'ip_vti0\x00', &(0x7f0000000080)={'ip_vti0\x00', 0x0}}) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x1a, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@printk={@lld}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @map_idx_val={0x18, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x15, 0x38, &(0x7f0000000940)=""/56, 0x41000, 0x30, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0x3, 0x7c9, 0x100}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r2}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r4, 0x0, 0x100000005) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x13, &(0x7f0000000180)=@ringbuf={{}, {}, {}, [@ringbuf_query]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) write$binfmt_script(r10, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r10, 0x0) setsockopt$packet_fanout_data(r9, 0x107, 0x16, &(0x7f0000000100)={0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x5, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7, 0x2}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0xd, 0x4}, {0x10, 0x2}, {0x10, 0x4}, {0xe, 0x5}, {0x6, 0x2}, {0x9}, {0xb, 0x3}, {0x0, 0x2}]}, @fwd={0x3}, @struct={0x1, 0x4, 0x0, 0x4, 0x1, 0x97, [{0x2, 0x4, 0x1}, {0x4, 0x5, 0x5}, {0x1, 0x0, 0x1}, {0xb, 0x1, 0x68}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x4}]}, @restrict={0xb, 0x0, 0x0, 0xb, 0x4}, @restrict={0x7}]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/205, 0x109, 0xcd, 0x0, 0x5}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='net_prio.prioidx\x00', 0x0, 0x0) close(r7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{}, &(0x7f0000000580), &(0x7f00000005c0)='%ps \x00'}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) executing program 3: set_mempolicy(0x4005, &(0x7f0000000040)=0x10000080007, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/10, 0xa}], 0x1, 0x0, 0x0) executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x24, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp={0xd, 0x0, 0x0, 0x1, 0x7, 0x1ff, 0xf3c, 0xea}}}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) r2 = syz_io_uring_setup(0x24f9, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x46f7db5bd1d56d71}) r6 = dup(r2) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) io_uring_enter(r6, 0x22, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r9 = socket$can_j1939(0x1d, 0x2, 0x7) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000100)={0x1d, r11}, 0x18) sendmsg$can_j1939(r9, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18, &(0x7f0000000080)={&(0x7f00000001c0)="b8", 0x1}, 0x4}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x868, 0x0, @perf_config_ext={0x1}, 0x9062, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x40000000, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4, @tid=r0}, 0x0) [ 335.189302][T17730] vxcan0: tx drop: invalid da for name 0x0000000000000002 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) setrlimit(0x2, &(0x7f0000000000)) prctl$PR_SET_MM(0x23, 0x8, &(0x7f00001f4000/0x1000)=nil) executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x0) setsockopt(r1, 0x10d, 0xa, &(0x7f00001c9fff)="03", 0x19) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in=@broadcast, @in=@local}, {@in=@loopback, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x0, 0x0, @in=@loopback}}]}, 0x154}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20000004) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000940), r5) sendmsg$IEEE802154_LLSEC_GETPARAMS(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x20, r6, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r4, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, r6, 0x10, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44001}, 0x24040091) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x50, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x50}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x40000) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) getsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmmsg$inet6(r2, &(0x7f0000001280)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_FAIL_OVER_MAC={0x5}, @IFLA_BOND_PRIMARY_RESELECT={0x5}]}}}]}, 0x44}}, 0x0) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x10\x00'}]}, 0x1c}}, 0x0) executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x7}, 0x5e) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0), 0x69) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002f00000036000000000005009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x0, 0x35, 0xb2, &(0x7f0000000b40)="3487188b17b83a1bceb0a4291273fee0dd76ce28a412b233570f9b2a7fd7b26f34647a3883b87f2187fccd4f35a681d0d7f80bd210557bcfd732f331c1e52da8631fe9a875ed91ecd1921be5cca6c4d59b7baf5b1c90e118f56992b394b33a331fd21957509290cc4e235cd7c37fa40052795b2483decfb7db6a8b240ab85403166195f08f1a3b3719409a9b7383aba1fbc1c9a5c8952fad5e057bfa0645fc1406324780484cc75d725e79f8326a058507910e4960a34bf28c5629c8dd4222e43bdd98d7d36d9da984a4bffe342a7103fdb765c9faca0659c89d576888b99ac672b65f13", &(0x7f0000000a80)=""/178, 0x0, 0x0, 0xb2, 0xa5, &(0x7f00000007c0)="b520610c75311127840b58a6e774c99d77a2786b5e40e99889424fbfc0176e825cd85cc8f395cc354a00ece16e23cd51984ae79fe0c634560c8f464090ce6439af15b4b269d3c63de01fb868c4ab750db87f3cc40f48caf494b88d4d332dcdad4a30b6d5f0c4a12a74a2d9d5600fa499513a6fa2fb6e973865e244bef4ba9c1290e7442c310436080fcaef33c26eab89dcd4237911034b8003ac93f1c2867de6b54ea530fa73610bbf08f1001b0ee02c0e68", &(0x7f0000000280)="4594193652f8997f4d29b3e8405a4466c300c63ff495e8c50c594b8d6d810087ac1dedc27528541a8b7d1eb0272035752624cf47d2ec5be8a5f08e8d45b19091ceb83a4f2665d95c616ca53641eaa5f607aa8619659f9dfc324ad0988188708276ac86c6ed8f5fe1a0bfdd5e8fa42bccb29234405ced7db7ca0f4a70f7d56a2b67c8a2f9aa1007b42a8e08ca54e01a0c96f169c16c46c1842cbc02ce3d2044acf47c43000000000000000000", 0x0, 0x1ff}, 0x28) executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) [ 335.682929][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:0.0.0.0]:20002. Sending cookies. executing program 3: set_mempolicy(0x4005, &(0x7f0000000040)=0x10000080007, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/10, 0xa}], 0x1, 0x0, 0x0) executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x0, 0xfffffdb7, &(0x7f0000000000)="8a39ebc33d3cd5262e53603ea04d6fc0ab41d63d38113db3693c0630ca49d0b531001caed5aecd8a6252d13c46385160a01fbb0607b2caa9b3105cab9e0c863e72c2a290ae1080fcb7920d45bb26b9224c"}) ioctl$EVIOCRMFF(r0, 0x80004519, 0x0) executing program 4: r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) pidfd_getfd(r1, r2, 0x0) executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x42}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x31) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x2}, 0x10) sendmsg$tipc(r0, &(0x7f0000001c80)={&(0x7f0000001a00)=@name={0x1e, 0x2, 0x0, {{0x0, 0x2}}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x0) setsockopt(r1, 0x10d, 0xa, &(0x7f00001c9fff)="03", 0x19) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in=@broadcast, @in=@local}, {@in=@loopback, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x0, 0x0, @in=@loopback}}]}, 0x154}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20000004) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000940), r5) sendmsg$IEEE802154_LLSEC_GETPARAMS(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x20, r6, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r4, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, r6, 0x10, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44001}, 0x24040091) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x50, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x50}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x40000) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) getsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmmsg$inet6(r2, &(0x7f0000001280)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_FAIL_OVER_MAC={0x5}, @IFLA_BOND_PRIMARY_RESELECT={0x5}]}}}]}, 0x44}}, 0x0) executing program 2: set_mempolicy(0x4005, &(0x7f0000000040)=0x10000080007, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/10, 0xa}], 0x1, 0x0, 0x0) executing program 2: r0 = io_uring_setup(0x30d1, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) recvmsg(r1, &(0x7f0000001500)={0x0, 0x1300, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x17fd}], 0x1, 0x0, 0xb2c86da597010000, 0x2700}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@mcast1={0xff, 0x5}, 0x0, 0x0, 0xff, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@private0, 0x200, 0x0, 0xff, 0x9}, 0x20) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 1: r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) pidfd_getfd(r1, r2, 0x0) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) executing program 1: r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) renameat2(r1, &(0x7f0000000140)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) r2 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./bus\x00', r3, &(0x7f0000000280)='./file0\x00', 0x5) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3, 0x6, 0x5, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x91}, 0x4040050) executing program 2: r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) renameat2(r1, &(0x7f0000000140)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) r2 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./bus\x00', r3, &(0x7f0000000280)='./file0\x00', 0x5) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3, 0x6, 0x5, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x91}, 0x4040050) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x0) setsockopt(r1, 0x10d, 0xa, &(0x7f00001c9fff)="03", 0x19) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in=@broadcast, @in=@local}, {@in=@loopback, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x0, 0x0, @in=@loopback}}]}, 0x154}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20000004) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000940), r5) sendmsg$IEEE802154_LLSEC_GETPARAMS(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x20, r6, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r4, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, r6, 0x10, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44001}, 0x24040091) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x50, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x50}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x40000) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) getsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmmsg$inet6(r2, &(0x7f0000001280)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_FAIL_OVER_MAC={0x5}, @IFLA_BOND_PRIMARY_RESELECT={0x5}]}}}]}, 0x44}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 3: syz_io_uring_setup(0x1b62, &(0x7f00000000c0), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x2}]}}}}}}}, 0x0) executing program 1: r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) pidfd_getfd(r1, r2, 0x0) executing program 2: r0 = io_uring_setup(0x30d1, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) recvmsg(r1, &(0x7f0000001500)={0x0, 0x1300, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x17fd}], 0x1, 0x0, 0xb2c86da597010000, 0x2700}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89f4, &(0x7f0000000000)={'team0\x00'}) executing program 3: r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) renameat2(r1, &(0x7f0000000140)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) r2 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./bus\x00', r3, &(0x7f0000000280)='./file0\x00', 0x5) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3, 0x6, 0x5, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x91}, 0x4040050) executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) executing program 3: mknod(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./bus\x00', 0x260001, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x8, 0x80000) openat(r1, &(0x7f0000000200)='./bus/file0\x00', 0x0, 0x0) dup2(r1, r2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x60102, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0xfffffecc}], 0x1) splice(r0, 0x0, r3, 0x0, 0xffffffe1, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={{0x14, 0x10, 0xc}, [@NFT_MSG_NEWCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x9c}}, 0x0) executing program 1: syz_io_uring_setup(0x1b62, &(0x7f00000000c0), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x2}]}}}}}}}, 0x0) executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x409a, &(0x7f0000000280)={[{@jqfmt_vfsold}, {@usrjquota, 0x22}, {@errors_continue}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@errors_continue}, {@errors_remount}, {@journal_dev={'journal_dev', 0x3d, 0x5}}]}, 0xfe, 0x454, &(0x7f0000000d80)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) getdents64(r0, 0x0, 0x0) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002400)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@jmp={0x5, 0x0, 0xb}, @alu={0x7}]}, &(0x7f0000000100)='syzkaller\x00'}, 0x9d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) [ 336.197409][T17827] loop2: detected capacity change from 0 to 512 [ 336.206829][T17827] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 336.215623][T17827] EXT4-fs (loop2): 1 truncate cleaned up [ 336.221288][T17827] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 2: open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x8}, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000180)={0x0, 0x0, 0x32}, 0x20) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x7) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r1, &(0x7f0000000040)='u', 0xa792a, 0x804, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7fff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "c4d7826fade200", "75e29881592b9fd38bcad042e286f2cd", ')\x00\x000', "578619a280c847dd"}, 0x28) sendfile(r2, r3, &(0x7f0000000100), 0x10001) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x0) setsockopt(r1, 0x10d, 0xa, &(0x7f00001c9fff)="03", 0x19) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in=@broadcast, @in=@local}, {@in=@loopback, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x0, 0x0, @in=@loopback}}]}, 0x154}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20000004) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000940), r5) sendmsg$IEEE802154_LLSEC_GETPARAMS(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x20, r6, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r4, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, r6, 0x10, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44001}, 0x24040091) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x50, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x50}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x40000) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) getsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmmsg$inet6(r2, &(0x7f0000001280)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_FAIL_OVER_MAC={0x5}, @IFLA_BOND_PRIMARY_RESELECT={0x5}]}}}]}, 0x44}}, 0x0) [ 336.235104][T17827] EXT4-fs error (device loop2): ext4_map_blocks:580: inode #2: block 4: comm syz-executor.2: lblock 0 mapped to illegal pblock 4 (length 1) [ 336.251673][T17827] EXT4-fs (loop2): Remounting filesystem read-only [ 336.266889][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 336.282622][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:0.0.0.0]:20002. Sending cookies. executing program 0: mknod(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./bus\x00', 0x260001, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x8, 0x80000) openat(r1, &(0x7f0000000200)='./bus/file0\x00', 0x0, 0x0) dup2(r1, r2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x60102, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0xfffffecc}], 0x1) splice(r0, 0x0, r3, 0x0, 0xffffffe1, 0x0) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002700)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae6138245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c710016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249d7b44e9d680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa73d897e3896d863081b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe885ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbd744e517e65ddab19e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8a6ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188541c300f5c1bf56705ba12d198e897186b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710f7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be29609eb144d75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47cbb0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9ea410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be0a33c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06a6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c5bed4b0d73dffb17a88aaad5921aee7dae6a2f3009d9cb434898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a64d903b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e7ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a00000000000000000000000000006a728258ca3d846a000e80d5f43109a48ddc54cec5d7f78c80e010ed02ffc0846577cafcd9e0ad83149bfb08ba7b5b431311041deb5e5d65610ad6e8d6ed55e9"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={{0x14, 0x10, 0xc}, [@NFT_MSG_NEWCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x9c}}, 0x0) executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mlock2(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1) executing program 2: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000640)='./bus\x00', 0x8, &(0x7f0000000000)=ANY=[], 0x1, 0x1270, &(0x7f0000001900)="$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") newfstatat(0xffffffffffffff9c, &(0x7f00000008c0)='./bus\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./bus\x00', 0x0) executing program 4: open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x8}, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000180)={0x0, 0x0, 0x32}, 0x20) executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@phonet={0x23, 0x0, 0x0, 0x31}, 0x80, 0x0}, 0x0) executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@mcast1={0xff, 0x5}, 0x0, 0x0, 0xff, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@private0, 0x200, 0x0, 0xff, 0x9}, 0x20) executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) open_tree(r0, &(0x7f0000000300)='\x00', 0x89901) [ 336.731931][T17853] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 336.738374][T17853] hsr_slave_1: hsr_addr_subst_dest: Unknown node executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={{0x14, 0x10, 0xc}, [@NFT_MSG_NEWCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x9c}}, 0x0) executing program 4: r0 = epoll_create1(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000020c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001040)={0x9000001d}) read(r1, &(0x7f0000000040)=""/4096, 0x1000) epoll_pwait(r0, &(0x7f0000000480)=[{}], 0x1, 0x0, 0x0, 0x0) executing program 2: r0 = socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@phonet={0x23, 0x0, 0x0, 0x31}, 0x80, 0x0}, 0x0) executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, 0x0, 0x3e}, 0x20) executing program 0: epoll_create1(0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x3d17, 0x0, 0x0, 0x0, 0x0, "dadd1000b1df022dace17a32d21100"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [{@seclabel}, {@appraise_type}, {@uid_eq}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x1, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x7b}], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) [ 336.787841][T17852] loop2: detected capacity change from 0 to 8192 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) open_tree(r0, &(0x7f0000000300)='\x00', 0x89901) executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000055090200000300006e00000000000000b702000000000000739af0ff00000000b509000000000000c32af4ff00000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 336.884493][T17870] pimreg: entered allmulticast mode executing program 0: r0 = epoll_create1(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000020c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001040)={0x9000001d}) read(r1, &(0x7f0000000040)=""/4096, 0x1000) epoll_pwait(r0, &(0x7f0000000480)=[{}], 0x1, 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x3}, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x8, 0x11, 0x0, @private2, @mcast2, {[], {0x0, 0xe22, 0x8}}}}}}, 0x0) executing program 4: r0 = epoll_create1(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000020c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001040)={0x9000001d}) read(r1, &(0x7f0000000040)=""/4096, 0x1000) epoll_pwait(r0, &(0x7f0000000480)=[{}], 0x1, 0x0, 0x0, 0x0) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002700)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae6138245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c710016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249d7b44e9d680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa73d897e3896d863081b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe885ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbd744e517e65ddab19e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8a6ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188541c300f5c1bf56705ba12d198e897186b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710f7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be29609eb144d75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47cbb0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9ea410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be0a33c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06a6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c5bed4b0d73dffb17a88aaad5921aee7dae6a2f3009d9cb434898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a64d903b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e7ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a00000000000000000000000000006a728258ca3d846a000e80d5f43109a48ddc54cec5d7f78c80e010ed02ffc0846577cafcd9e0ad83149bfb08ba7b5b431311041deb5e5d65610ad6e8d6ed55e9"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={{0x14, 0x10, 0xc}, [@NFT_MSG_NEWCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x9c}}, 0x0) [ 336.911406][T17878] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 336.917807][T17878] hsr_slave_1: hsr_addr_subst_dest: Unknown node executing program 2: r0 = fsopen(&(0x7f0000000340)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000001600)='\xcfD\xbc\xbf\x95@\xd6j\'$\x1d\x14\xb7!\x8b\xff\xdc\x83\xc5$\xb3\xecr\xe4G:\x93\xdfj\x96\x7f\x03\xe5\x94\x04[\x02\xa9[>\xf9\x9c\x83@\x1e\x99\xcah\x85\xb8\xbeSAk\xf4\xb6 \xdf\xa0P\x18\x19\xae\x8c\x9a\x19mm\r<|\xe8\x9e\xa0x\x84p2\xf9\xe2\xed\xb0\f\x7f;\xf6J18G\x84c\x88\x9d{\xf4~\xdby\xe1\xdf\x1a\xae\xd6ez\xe5\xa8\xe1\'', &(0x7f0000000080)='MS{O', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000440)='\x18\xe7#\xf7\xcd %\xef<^\x00\x00\x00', &(0x7f0000001a80)='$\x00M\x12#P\'`\xc2\xce\xc0\x00#\xd8z\xda\xdad{\x1b\xcc\bAU,\xf1\xf00\x8fi\n)\x14w\x00x\xb5\xcd\x1dI\r\xbc\xdeV\x8f^\xbej?f\xf2\x96K\x8e\f\x93\x01\x15\xd9$3\x0fuh#\xc4\x1dg\xeb\x89\xe4\a3\xb7[\xcc\xbc\xeae\x018\xb6F\xdak\xf4\x94K\xc9\xd9I*\xd2\x9e(\x80&\xe1\x16\xc6w\xb9\x144\xb6\x89\a\xd9\x87\x7f\xe6\xb4\xa2\x05\x1f9\x1a5\x13\xe6\x84PO\t\x05y\x83v\x98\xf3\x06\bu\xbd\xee\xc4c`\xc7\x9bzN\xfe\t1\x9f\x8a\xcd\x81\aJ5Rv\xaei\xa7M\xbb\xadUg\x9d6|\x9e\x84\xe0\xd2\x8bf\xeaEyNz\x7f0LM\xc4\xa5\xbc\xda\x91B$\xd9\xc6\x87P\x85:\x90\xaf\x1f\x7f\xd0\xf3\t\xf7\xe1\xdb\xe7\x1d\x0f\x1d\xf8\x98\xfd\x05=\xf7\xa4A\xf8=\rb~\x9c\x83v\xda9\x94*\xb3Y\x01\xb5$\xc5_w\xce\x85\xe2#b8CN\xa5:\xd5\x02v\xe3\xe1\xdb\xe2z\x06\x17\x93\x9d8]H\xca\xc0\x95\x81oS\x89p\xe2\x80\xf5\xcc\xc7\x7f\x14\xb4&\x8bQ\xa4z\xc1\xa7s\x15\xc8\xc2Tusdu\xfb\xed\x00\x92\x18\xec\f\x9b\x16\xc5\xbb\x9f\xdb\x17\xcep\xa8\xcd\xec\x8c\x80\x84\xc0*(\x96g\x94\xa7\x84[9\x83\xcb\xc7\xc6\xeb\xfd\xb4\xf0', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000005c0)='dE\x00', 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000280)='\xd0\x9e^\xa0\xee\xc8\x17T\xb1GI\x90\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xf1\xf9\x9c\x83@\x1e\x99\xcah\x85\xb8\xbeSAk\xf4\xb6 \xdf\xa0P\x18\x19\xae\x8c\x9a\x19mm\r<|\xe8\x9e\xa0x\x84p2\xf9\xe2\xed\xb0\f\x7f;\xf6J18G\x84c\x88\x9d{\xf4~\xdby\xe1\xdf\x1a\xae\xd6ez\xe5\xa8\xe1\'', &(0x7f0000000080)='MS{O', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000440)='\x18\xe7#\xf7\xcd %\xef<^\x00\x00\x00', &(0x7f0000001a80)='$\x00M\x12#P\'`\xc2\xce\xc0\x00#\xd8z\xda\xdad{\x1b\xcc\bAU,\xf1\xf00\x8fi\n)\x14w\x00x\xb5\xcd\x1dI\r\xbc\xdeV\x8f^\xbej?f\xf2\x96K\x8e\f\x93\x01\x15\xd9$3\x0fuh#\xc4\x1dg\xeb\x89\xe4\a3\xb7[\xcc\xbc\xeae\x018\xb6F\xdak\xf4\x94K\xc9\xd9I*\xd2\x9e(\x80&\xe1\x16\xc6w\xb9\x144\xb6\x89\a\xd9\x87\x7f\xe6\xb4\xa2\x05\x1f9\x1a5\x13\xe6\x84PO\t\x05y\x83v\x98\xf3\x06\bu\xbd\xee\xc4c`\xc7\x9bzN\xfe\t1\x9f\x8a\xcd\x81\aJ5Rv\xaei\xa7M\xbb\xadUg\x9d6|\x9e\x84\xe0\xd2\x8bf\xeaEyNz\x7f0LM\xc4\xa5\xbc\xda\x91B$\xd9\xc6\x87P\x85:\x90\xaf\x1f\x7f\xd0\xf3\t\xf7\xe1\xdb\xe7\x1d\x0f\x1d\xf8\x98\xfd\x05=\xf7\xa4A\xf8=\rb~\x9c\x83v\xda9\x94*\xb3Y\x01\xb5$\xc5_w\xce\x85\xe2#b8CN\xa5:\xd5\x02v\xe3\xe1\xdb\xe2z\x06\x17\x93\x9d8]H\xca\xc0\x95\x81oS\x89p\xe2\x80\xf5\xcc\xc7\x7f\x14\xb4&\x8bQ\xa4z\xc1\xa7s\x15\xc8\xc2Tusdu\xfb\xed\x00\x92\x18\xec\f\x9b\x16\xc5\xbb\x9f\xdb\x17\xcep\xa8\xcd\xec\x8c\x80\x84\xc0*(\x96g\x94\xa7\x84[9\x83\xcb\xc7\xc6\xeb\xfd\xb4\xf0', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000005c0)='dE\x00', 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000280)='\xd0\x9e^\xa0\xee\xc8\x17T\xb1GI\x90\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xf10xffffffffffffffff}) close(r1) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@phonet={0x23, 0x0, 0x0, 0x31}, 0x80, 0x0}, 0x0) executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r0, 0x0, 0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) listen(r2, 0x3) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001500), 0x588, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x8000, 0x0, 0x0, 0x20000}, 0x1c) unshare(0x22020400) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) ioctl$RTC_UIE_ON(r5, 0x7003) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x3, 0x4) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$unix(r3, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x103701) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) [ 337.084820][T17905] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 337.091315][T17905] hsr_slave_1: hsr_addr_subst_dest: Unknown node executing program 4: r0 = fsopen(&(0x7f0000000340)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000001600)='\xcfD\xbc\xbf\x95@\xd6j\'$\x1d\x14\xb7!\x8b\xff\xdc\x83\xc5$\xb3\xecr\xe4G:\x93\xdfj\x96\x7f\x03\xe5\x94\x04[\x02\xa9[>\xf9\x9c\x83@\x1e\x99\xcah\x85\xb8\xbeSAk\xf4\xb6 \xdf\xa0P\x18\x19\xae\x8c\x9a\x19mm\r<|\xe8\x9e\xa0x\x84p2\xf9\xe2\xed\xb0\f\x7f;\xf6J18G\x84c\x88\x9d{\xf4~\xdby\xe1\xdf\x1a\xae\xd6ez\xe5\xa8\xe1\'', &(0x7f0000000080)='MS{O', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000440)='\x18\xe7#\xf7\xcd %\xef<^\x00\x00\x00', &(0x7f0000001a80)='$\x00M\x12#P\'`\xc2\xce\xc0\x00#\xd8z\xda\xdad{\x1b\xcc\bAU,\xf1\xf00\x8fi\n)\x14w\x00x\xb5\xcd\x1dI\r\xbc\xdeV\x8f^\xbej?f\xf2\x96K\x8e\f\x93\x01\x15\xd9$3\x0fuh#\xc4\x1dg\xeb\x89\xe4\a3\xb7[\xcc\xbc\xeae\x018\xb6F\xdak\xf4\x94K\xc9\xd9I*\xd2\x9e(\x80&\xe1\x16\xc6w\xb9\x144\xb6\x89\a\xd9\x87\x7f\xe6\xb4\xa2\x05\x1f9\x1a5\x13\xe6\x84PO\t\x05y\x83v\x98\xf3\x06\bu\xbd\xee\xc4c`\xc7\x9bzN\xfe\t1\x9f\x8a\xcd\x81\aJ5Rv\xaei\xa7M\xbb\xadUg\x9d6|\x9e\x84\xe0\xd2\x8bf\xeaEyNz\x7f0LM\xc4\xa5\xbc\xda\x91B$\xd9\xc6\x87P\x85:\x90\xaf\x1f\x7f\xd0\xf3\t\xf7\xe1\xdb\xe7\x1d\x0f\x1d\xf8\x98\xfd\x05=\xf7\xa4A\xf8=\rb~\x9c\x83v\xda9\x94*\xb3Y\x01\xb5$\xc5_w\xce\x85\xe2#b8CN\xa5:\xd5\x02v\xe3\xe1\xdb\xe2z\x06\x17\x93\x9d8]H\xca\xc0\x95\x81oS\x89p\xe2\x80\xf5\xcc\xc7\x7f\x14\xb4&\x8bQ\xa4z\xc1\xa7s\x15\xc8\xc2Tusdu\xfb\xed\x00\x92\x18\xec\f\x9b\x16\xc5\xbb\x9f\xdb\x17\xcep\xa8\xcd\xec\x8c\x80\x84\xc0*(\x96g\x94\xa7\x84[9\x83\xcb\xc7\xc6\xeb\xfd\xb4\xf0', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000005c0)='dE\x00', 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000280)='\xd0\x9e^\xa0\xee\xc8\x17T\xb1GI\x90\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xf1\xf9\x9c\x83@\x1e\x99\xcah\x85\xb8\xbeSAk\xf4\xb6 \xdf\xa0P\x18\x19\xae\x8c\x9a\x19mm\r<|\xe8\x9e\xa0x\x84p2\xf9\xe2\xed\xb0\f\x7f;\xf6J18G\x84c\x88\x9d{\xf4~\xdby\xe1\xdf\x1a\xae\xd6ez\xe5\xa8\xe1\'', &(0x7f0000000080)='MS{O', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000440)='\x18\xe7#\xf7\xcd %\xef<^\x00\x00\x00', &(0x7f0000001a80)='$\x00M\x12#P\'`\xc2\xce\xc0\x00#\xd8z\xda\xdad{\x1b\xcc\bAU,\xf1\xf00\x8fi\n)\x14w\x00x\xb5\xcd\x1dI\r\xbc\xdeV\x8f^\xbej?f\xf2\x96K\x8e\f\x93\x01\x15\xd9$3\x0fuh#\xc4\x1dg\xeb\x89\xe4\a3\xb7[\xcc\xbc\xeae\x018\xb6F\xdak\xf4\x94K\xc9\xd9I*\xd2\x9e(\x80&\xe1\x16\xc6w\xb9\x144\xb6\x89\a\xd9\x87\x7f\xe6\xb4\xa2\x05\x1f9\x1a5\x13\xe6\x84PO\t\x05y\x83v\x98\xf3\x06\bu\xbd\xee\xc4c`\xc7\x9bzN\xfe\t1\x9f\x8a\xcd\x81\aJ5Rv\xaei\xa7M\xbb\xadUg\x9d6|\x9e\x84\xe0\xd2\x8bf\xeaEyNz\x7f0LM\xc4\xa5\xbc\xda\x91B$\xd9\xc6\x87P\x85:\x90\xaf\x1f\x7f\xd0\xf3\t\xf7\xe1\xdb\xe7\x1d\x0f\x1d\xf8\x98\xfd\x05=\xf7\xa4A\xf8=\rb~\x9c\x83v\xda9\x94*\xb3Y\x01\xb5$\xc5_w\xce\x85\xe2#b8CN\xa5:\xd5\x02v\xe3\xe1\xdb\xe2z\x06\x17\x93\x9d8]H\xca\xc0\x95\x81oS\x89p\xe2\x80\xf5\xcc\xc7\x7f\x14\xb4&\x8bQ\xa4z\xc1\xa7s\x15\xc8\xc2Tusdu\xfb\xed\x00\x92\x18\xec\f\x9b\x16\xc5\xbb\x9f\xdb\x17\xcep\xa8\xcd\xec\x8c\x80\x84\xc0*(\x96g\x94\xa7\x84[9\x83\xcb\xc7\xc6\xeb\xfd\xb4\xf0', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000005c0)='dE\x00', 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000280)='\xd0\x9e^\xa0\xee\xc8\x17T\xb1GI\x90\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xf10x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x3c) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="34000000100081eee80000040020000010000000", @ANYRES32=r7, @ANYBLOB="ddfffffdff000000140012000cd2c97e6a5d8223a9b0a5767b474587b1e6b45000b7369c16c63fcf3968d0b709d2963be305916ec66c17f031bfeac2830f1f479f1932591c1193d884521905d3449abf525c9542938af98033fda7508f3155942c99be587e51100b1dd6c22ee51bb58e87d9b149910e7fbe72ca6e1e0ece909918b09ffe2ccf254a1eddbc2639b14e80d5174d6fb521397208989061120dfce7ad1527102c939b680e45949ef9248913ad7f5d331c573728d36e9e2884df4c793b22739f091d4b19f483703b4408b1ae809c55ceed85a52a09"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@ipv6_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r7}}, @RTA_GATEWAY={0x14, 0x5, @dev}]}, 0x3c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000500)}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) bpf$ITER_CREATE(0x21, &(0x7f0000000ac0), 0x8) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_tracing={0x1a, 0x21, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000020000000000000104000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000093000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018270000", @ANYRES32, @ANYBLOB="0000000007000000950000000000000045380c0008000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000cc0)='GPL\x00', 0x0, 0x32, &(0x7f0000000d00)=""/50, 0x41000, 0x21, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0x8, 0x5}, 0xfffffffffffffcdd, 0x10, &(0x7f0000000d80)={0x3, 0x10, 0x40000000, 0x42}, 0x10, 0x187af, 0xffffffffffffffff, 0x7, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x3, 0x1, 0xb, 0xa}, {0x5, 0x3, 0xe, 0x7}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x1, 0xe, 0x5}, {0x4, 0x1, 0x7, 0x9}, {0x2, 0x4, 0x4, 0xd}, {0x0, 0x3, 0x1, 0xc}], 0x10, 0x1}, 0x90) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000003640), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x24, &(0x7f0000001700)=ANY=[@ANYBLOB="18000000e1270000000000000200000098110000e60a83", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000480ee6ae1499ce8000000055090100000000009500000000000000189e0c000800"/79, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001869000001000000000000007f00000018400000020000000000000000000000180100002020702500000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b90100008500000006000000bf91000000000000b7020000010000008500000085000007cba22217d848fb009500000000000000", @ANYRESHEX=r8, @ANYRES16, @ANYRESOCT=r9], &(0x7f0000000380)='GPL\x00', 0x2, 0xe1, &(0x7f0000000640)=""/225, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xf, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000740)=[0xffffffffffffffff], &(0x7f0000000780)=[{0x4, 0x2, 0x9, 0x9}, {0x3, 0x4, 0x6, 0x9}, {0x5, 0x3, 0xc, 0xc}], 0x10, 0x1}, 0x90) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@ipv6_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r7}}, @RTA_GATEWAY={0x14, 0x5, @dev}]}, 0x3c}}, 0x0) executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000000), 0x4) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 4: r0 = socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x100}, 0x10) sendmmsg(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x80, 0x0}}], 0x2, 0x0) [ 337.229663][T17923] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x20, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x9, 0x0, 0x0, @u32}]}]}, 0x20}}, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r6, 0x40309410, 0x0) write$binfmt_script(r6, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\x00'}, {0x20, 'F@'}, {0x20, 'cgroup.procs\x00'}, {0x20, '\xc0\\'}], 0xa, "e5b91177de325f9777b65a073cedbbc5b198e5a06c8015255b3f230d8191a37ef9ad8bc095e863c5a8b603ffb9f155ac7332d2"}, 0x54) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x3c) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="34000000100081eee80000040020000010000000", @ANYRES32=r7, @ANYBLOB="ddfffffdff000000140012000cd2c97e6a5d8223a9b0a5767b474587b1e6b45000b7369c16c63fcf3968d0b709d2963be305916ec66c17f031bfeac2830f1f479f1932591c1193d884521905d3449abf525c9542938af98033fda7508f3155942c99be587e51100b1dd6c22ee51bb58e87d9b149910e7fbe72ca6e1e0ece909918b09ffe2ccf254a1eddbc2639b14e80d5174d6fb521397208989061120dfce7ad1527102c939b680e45949ef9248913ad7f5d331c573728d36e9e2884df4c793b22739f091d4b19f483703b4408b1ae809c55ceed85a52a09"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@ipv6_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r7}}, @RTA_GATEWAY={0x14, 0x5, @dev}]}, 0x3c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000500)}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) bpf$ITER_CREATE(0x21, &(0x7f0000000ac0), 0x8) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_tracing={0x1a, 0x21, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000020000000000000104000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000093000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018270000", @ANYRES32, @ANYBLOB="0000000007000000950000000000000045380c0008000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000cc0)='GPL\x00', 0x0, 0x32, &(0x7f0000000d00)=""/50, 0x41000, 0x21, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0x8, 0x5}, 0xfffffffffffffcdd, 0x10, &(0x7f0000000d80)={0x3, 0x10, 0x40000000, 0x42}, 0x10, 0x187af, 0xffffffffffffffff, 0x7, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x3, 0x1, 0xb, 0xa}, {0x5, 0x3, 0xe, 0x7}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x1, 0xe, 0x5}, {0x4, 0x1, 0x7, 0x9}, {0x2, 0x4, 0x4, 0xd}, {0x0, 0x3, 0x1, 0xc}], 0x10, 0x1}, 0x90) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000003640), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x24, &(0x7f0000001700)=ANY=[@ANYBLOB="18000000e1270000000000000200000098110000e60a83", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000480ee6ae1499ce8000000055090100000000009500000000000000189e0c000800"/79, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001869000001000000000000007f00000018400000020000000000000000000000180100002020702500000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b90100008500000006000000bf91000000000000b7020000010000008500000085000007cba22217d848fb009500000000000000", @ANYRESHEX=r8, @ANYRES16, @ANYRESOCT=r9], &(0x7f0000000380)='GPL\x00', 0x2, 0xe1, &(0x7f0000000640)=""/225, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xf, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000740)=[0xffffffffffffffff], &(0x7f0000000780)=[{0x4, 0x2, 0x9, 0x9}, {0x3, 0x4, 0x6, 0x9}, {0x5, 0x3, 0xc, 0xc}], 0x10, 0x1}, 0x90) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@ipv6_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r7}}, @RTA_GATEWAY={0x14, 0x5, @dev}]}, 0x3c}}, 0x0) executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000055090200000300006e00000000000000b702000000000000739af0ff00000000b509000000000000c32af4ff00000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a320000000060000000060a010400000000000000000100000008000b400000000038000480240001800b0001007470726f7879000014000280080001400000000a0800024000003eb910000180070001007274000004000280090001"], 0xd4}}, 0x0) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x0, 0x81, 0x0, 0x2, 0x0, 0x1}, 0x48) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f00000003c0)={&(0x7f00000007c0)=""/4096, 0x1000}) vmsplice(r0, &(0x7f0000000040), 0x100000000000026a, 0x0) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x60}}, 0x0) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 3: r0 = socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x100}, 0x10) sendmmsg(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x80, 0x0}}], 0x2, 0x0) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x3, 0x4) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$unix(r3, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) [ 337.667115][T17944] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000000), 0x4) executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x20, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x9, 0x0, 0x0, @u32}]}]}, 0x20}}, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r6, 0x40309410, 0x0) write$binfmt_script(r6, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\x00'}, {0x20, 'F@'}, {0x20, 'cgroup.procs\x00'}, {0x20, '\xc0\\'}], 0xa, "e5b91177de325f9777b65a073cedbbc5b198e5a06c8015255b3f230d8191a37ef9ad8bc095e863c5a8b603ffb9f155ac7332d2"}, 0x54) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x3c) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="34000000100081eee80000040020000010000000", @ANYRES32=r7, @ANYBLOB="ddfffffdff000000140012000cd2c97e6a5d8223a9b0a5767b474587b1e6b45000b7369c16c63fcf3968d0b709d2963be305916ec66c17f031bfeac2830f1f479f1932591c1193d884521905d3449abf525c9542938af98033fda7508f3155942c99be587e51100b1dd6c22ee51bb58e87d9b149910e7fbe72ca6e1e0ece909918b09ffe2ccf254a1eddbc2639b14e80d5174d6fb521397208989061120dfce7ad1527102c939b680e45949ef9248913ad7f5d331c573728d36e9e2884df4c793b22739f091d4b19f483703b4408b1ae809c55ceed85a52a09"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@ipv6_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r7}}, @RTA_GATEWAY={0x14, 0x5, @dev}]}, 0x3c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000500)}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) bpf$ITER_CREATE(0x21, &(0x7f0000000ac0), 0x8) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_tracing={0x1a, 0x21, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000020000000000000104000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000093000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018270000", @ANYRES32, @ANYBLOB="0000000007000000950000000000000045380c0008000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000cc0)='GPL\x00', 0x0, 0x32, &(0x7f0000000d00)=""/50, 0x41000, 0x21, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0x8, 0x5}, 0xfffffffffffffcdd, 0x10, &(0x7f0000000d80)={0x3, 0x10, 0x40000000, 0x42}, 0x10, 0x187af, 0xffffffffffffffff, 0x7, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x3, 0x1, 0xb, 0xa}, {0x5, 0x3, 0xe, 0x7}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x1, 0xe, 0x5}, {0x4, 0x1, 0x7, 0x9}, {0x2, 0x4, 0x4, 0xd}, {0x0, 0x3, 0x1, 0xc}], 0x10, 0x1}, 0x90) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000003640), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x24, &(0x7f0000001700)=ANY=[@ANYBLOB="18000000e1270000000000000200000098110000e60a83", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000480ee6ae1499ce8000000055090100000000009500000000000000189e0c000800"/79, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001869000001000000000000007f00000018400000020000000000000000000000180100002020702500000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b90100008500000006000000bf91000000000000b7020000010000008500000085000007cba22217d848fb009500000000000000", @ANYRESHEX=r8, @ANYRES16, @ANYRESOCT=r9], &(0x7f0000000380)='GPL\x00', 0x2, 0xe1, &(0x7f0000000640)=""/225, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xf, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000740)=[0xffffffffffffffff], &(0x7f0000000780)=[{0x4, 0x2, 0x9, 0x9}, {0x3, 0x4, 0x6, 0x9}, {0x5, 0x3, 0xc, 0xc}], 0x10, 0x1}, 0x90) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@ipv6_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r7}}, @RTA_GATEWAY={0x14, 0x5, @dev}]}, 0x3c}}, 0x0) executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x4001, 0x8000000, 0x240, 0x0, 0x720d, 0x148, 0xd8, 0x148, 0x1a8, 0x240, 0x240, 0x1a8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@loopback, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) sendto$inet(r0, 0x0, 0xfffffffffffffeb5, 0x24004810, 0x0, 0x0) setreuid(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x0, @multicast1}, 0x10) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722880b6c2a7", 0x0, 0x8000}, 0x28) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) [ 337.783514][T17965] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 337.801097][T17965] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 337.808457][T17965] IPv6: NLM_F_CREATE should be set when creating new route [ 337.823806][T17965] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE executing program 1: socketpair(0x22, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x0]}}}, 0x4e}]}) syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x800, &(0x7f0000000140)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="300000001c00070c000000000000000007000000", @ANYRES32=r5, @ANYBLOB="400000000a000200aaaaaaaaaabb000008000f00da"], 0x30}}, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1c1040, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x80001, 0x80001f) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546", 0x28, 0x4014, 0x0, 0x0) shutdown(r3, 0x0) splice(r3, 0x0, r2, 0x0, 0x0, 0x0) r7 = socket(0x0, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r7, &(0x7f0000000180)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000080)=0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x5c, r1, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) executing program 0: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x6}, &(0x7f0000000100)=0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000, &(0x7f0000000180), 0x23, 0x33e, &(0x7f0000000500)="$eJzs3U1oHGUYB/BnO0k2DdTsQSh6Wr0JUpqIBz0llArFHLSy+HVxsakf2bWQxYV4yHYvikfFi6Anbz3osWfxIOLNg1crSFW82FuhxZHdmcx+21TY1I/f7xAenvf977wzO8luQvLmlY3YubAYF2/cuB7Ly6VY2DizETdLUYljkUTmcgAA/yU30zR+TzN3nv3hykG1NOd1AQDz03/9f+3EoFG+l6sBAI7CIb//f2Zq99LclgUAzNHE6//DI8NjP+ZfKH4nAAD493ruxZee3tyKOF+tLkc032vX2rV4cjC+eTHeiEZsx+lYjdsR2RuF7N1C7+NT57bOnq72/FyJWi/RrkU0O+1a9k5hM+nny7EWq1HJ82mRT3r5tX6+GhGXO/3jR7PUri3GSn78H1ZiO9ZjNe6fyEec2zq73ksvRzVqzYN8J6Ibywcn0Vv/qViN716NS9GIC9HLDta/v1atnkm3RvLtK+X+PAAAAAAAAAAAAAAAAAAAAAAAmIdT1UKl2P8mbXba754fn1AZ2R+nlg3n+wN1s/2B0vLB7jzvJ+P7A1VH99epLcSxe3rmAAAAAAAAAAAAAAAAAAAA8M/R2luKeqOxvdvae2enKHojQ523vvn8q+MxNqf+ZjLoxEL2cCNz8l4MpZIo4mkRT5OROXmRRAwmX7larHh4Trk4i4l4ryhPDJXyNdUbjRMP/fTJtNQfg04SuzMeOS9K+fGHhpr3Za2/SM0u1u8w51qaprPi+x9PpqIUsTDxxB26iMrMoa+vv/7AY62Tj/c7X+abPjzy6Orz1z767NedeiPyS9NoLO22bqd/62pkT8Hg3ijl17k05U6YXnQHne5ua6+efP/bCw9+8O3Y5GT6/ZMOd96efawvxjtLWVEa/SSaWSxOufmnFy/fKu7eu7+YJz/dqF/d//GXw6aGvkjYqAMAAAAAAAAAAAAAAAAAAI7E0B9734Unnp3figAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg6A3+//9Q0Z3oHKa41YnJofL2bmvmwY8f6akCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA/9mcAAAD//7VPdhk=") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, "837ad552eed22b08", "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0x8000c61) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc042, 0x0) sendfile(r2, r2, 0x0, 0x40000000fffff803) [ 337.935860][T17981] loop0: detected capacity change from 0 to 256 [ 337.950304][T17981] FAT-fs (loop0): Directory bread(block 64) failed [ 337.957467][T17981] FAT-fs (loop0): Directory bread(block 65) failed [ 337.964071][T17981] FAT-fs (loop0): Directory bread(block 66) failed [ 337.970853][T17981] FAT-fs (loop0): Directory bread(block 67) failed [ 337.977930][T17981] FAT-fs (loop0): Directory bread(block 68) failed executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020d3"]) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, 0x0) [ 337.984575][T17981] FAT-fs (loop0): Directory bread(block 69) failed [ 337.991296][T17981] FAT-fs (loop0): Directory bread(block 70) failed [ 337.997979][T17981] FAT-fs (loop0): Directory bread(block 71) failed [ 338.004679][T17981] FAT-fs (loop0): Directory bread(block 72) failed [ 338.012390][T17981] FAT-fs (loop0): Directory bread(block 73) failed executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x7667, &(0x7f0000000080), 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) syz_io_uring_setup(0x1d30, &(0x7f0000000080), 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) pselect6(0x40, &(0x7f0000000000)={0x1fe}, 0x0, 0x0, 0x0, 0x0) [ 338.056275][T17988] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 338.063843][T17988] vhci_hcd: default hub control req: d300 v0000 i0000 l0 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) sendmsg$nl_xfrm(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@multicast2}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x7, 0x0, 0x0, @in=@loopback}}]}, 0x154}}, 0x0) executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x92, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40086602, 0xf0ff1f00000000) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) [ 338.122197][T17981] syz-executor.0: attempt to access beyond end of device [ 338.122197][T17981] loop0: rw=0, sector=1192, nr_sectors = 4 limit=256 [ 338.140268][T17981] syz-executor.0: attempt to access beyond end of device [ 338.140268][T17981] loop0: rw=0, sector=1192, nr_sectors = 4 limit=256 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x4, @random="74995e1ae276", 'sit0\x00'}}, 0x1e) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) ioperm(0x0, 0x401, 0x401) lsm_set_self_attr(0x0, 0x0, 0xfffffffffffffeac, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x11, 0x0, &(0x7f00000008c0)) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x46c) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r2, 0x6256, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r1) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x46c) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r2, 0x6256, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r1) [ 338.174259][ T28] audit: type=1400 audit(2000000120.299:1111): avc: denied { setattr } for pid=18002 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) fcntl$setlease(r0, 0x400, 0x2) executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x4, @random="74995e1ae276", 'sit0\x00'}}, 0x1e) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) ioperm(0x0, 0x401, 0x401) lsm_set_self_attr(0x0, 0x0, 0xfffffffffffffeac, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x11, 0x0, &(0x7f00000008c0)) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) executing program 0: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x6}, &(0x7f0000000100)=0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000, &(0x7f0000000180), 0x23, 0x33e, &(0x7f0000000500)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, "837ad552eed22b08", "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0x8000c61) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc042, 0x0) sendfile(r2, r2, 0x0, 0x40000000fffff803) executing program 1: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x6}, &(0x7f0000000100)=0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000, &(0x7f0000000180), 0x23, 0x33e, &(0x7f0000000500)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, "837ad552eed22b08", "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0x8000c61) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc042, 0x0) sendfile(r2, r2, 0x0, 0x40000000fffff803) executing program 4: r0 = memfd_create(&(0x7f00000001c0)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb80xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x46c) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r2, 0x6256, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r1) executing program 4: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0xd, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa210104, @local, {[@noop, @timestamp_addr={0x44, 0x1c, 0xe, 0x1, 0x0, [{@multicast1}, {@local}, {@multicast1}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x9, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000340)={r0, &(0x7f0000000180), 0x0}, 0x20) [ 338.488870][T18023] syz-executor.1: attempt to access beyond end of device [ 338.488870][T18023] loop1: rw=0, sector=1192, nr_sectors = 4 limit=256 [ 338.489177][T18021] syz-executor.0: attempt to access beyond end of device [ 338.489177][T18021] loop0: rw=0, sector=1192, nr_sectors = 4 limit=256 [ 338.508541][T18023] syz-executor.1: attempt to access beyond end of device [ 338.508541][T18023] loop1: rw=0, sector=1192, nr_sectors = 4 limit=256 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) fcntl$setlease(r0, 0x400, 0x2) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x60}}, 0x0) executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYRESHEX]) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000000740)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r4, 0x0, 0x0, 0x0, {@in6_addr=@loopback={0xeaffffff00000000}, 0x800}}}]}, 0x38}, 0x1, 0xf00}, 0x0) [ 338.553867][T18021] syz-executor.0: attempt to access beyond end of device [ 338.553867][T18021] loop0: rw=0, sector=1192, nr_sectors = 4 limit=256 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020d3"]) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, 0x0) executing program 2: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x6}, &(0x7f0000000100)=0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000, &(0x7f0000000180), 0x23, 0x33e, &(0x7f0000000500)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, "837ad552eed22b08", "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0x8000c61) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc042, 0x0) sendfile(r2, r2, 0x0, 0x40000000fffff803) executing program 1: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x7, &(0x7f00000001c0)=0x8, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_batadv\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f00000005c0)={0x1d, r1}, 0x10, &(0x7f0000000700)={&(0x7f00000000c0)=@can={{}, 0x86, 0x0, 0x4, 0x2, "500000b74b958e56"}, 0x10}}, 0x0) executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) splice(r0, 0x0, r1, 0x0, 0x39000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/237, 0xed, 0x1, &(0x7f0000000480)=""/170, 0xaa}, &(0x7f0000000200)=0x40) r2 = epoll_create1(0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x48, 0x0, 0x0, 0x1}, {0x15}, {0x6, 0x0, 0x0, 0xbffffffe}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) read$char_usb(r3, &(0x7f0000001980)=""/179, 0xb3) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000580)={0x7}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x6}, &(0x7f0000000100)=0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000, &(0x7f0000000180), 0x23, 0x33e, &(0x7f0000000500)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, "837ad552eed22b08", "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0x8000c61) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc042, 0x0) sendfile(r2, r2, 0x0, 0x40000000fffff803) executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000f0000002c000000020000000000000001"], 0x0, 0x46}, 0x20) bpf$ITER_CREATE(0xb, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="cf488190e610e8c014853e5c8eea917335845f91f7a8aa486999a3113aa36c166fedec83ed8861d6b9fd658e08ed9562c22c3c32b55473d4c31291a2627163dcb78911a768dbe6df312d8f437b553499ad6dcf3e57b882d240f53a92a27856a14a462ff6ee30c74e692851e87018d63dcbc776d0f93f08f7633ac3ec309ec3f381a690cecc2966917b53b11c176133eead313a92597397b0332748049e9d87c6bbbcd0e48a22b70481efd491dfbe6c281e3465e87b6ae61870a8a1f93845f8ded3805d6ba3", 0xc5, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000440)=@ax25={{0x3, @null}, [@remote, @rose, @netrom, @bcast, @null, @rose, @remote, @bcast]}, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000006c0)=""/189}, {&(0x7f00000004c0)=""/92}, {&(0x7f0000000780)=""/181}, {&(0x7f0000000880)=""/200}, {&(0x7f0000000980)=""/252}, {&(0x7f0000000a80)=""/94}, {&(0x7f0000000b00)=""/192}, {&(0x7f0000000bc0)=""/194}], 0x0, &(0x7f0000000d40)=""/211}}], 0x1d, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 338.630192][T18051] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 338.643606][T18051] vhci_hcd: default hub control req: d300 v0000 i0000 l0 [ 338.661319][T18059] loop2: detected capacity change from 0 to 256 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000c80)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @local, {[@rr={0x7, 0x3, 0x27}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) [ 338.687401][T18059] FAT-fs (loop2): Directory bread(block 64) failed [ 338.701141][T18063] loop3: detected capacity change from 0 to 256 [ 338.709015][T18059] FAT-fs (loop2): Directory bread(block 65) failed [ 338.717359][T18068] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 338.718212][T18059] FAT-fs (loop2): Directory bread(block 66) failed executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000021c0)={@link_local, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x8, 0x3a, 0x0, @remote, @mcast2, {[], @mlv2_report}}}}}, 0x0) executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x4, @random="74995e1ae276", 'sit0\x00'}}, 0x1e) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) ioperm(0x0, 0x401, 0x401) lsm_set_self_attr(0x0, 0x0, 0xfffffffffffffeac, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x11, 0x0, &(0x7f00000008c0)) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) [ 338.733767][T18059] FAT-fs (loop2): Directory bread(block 67) failed [ 338.743233][T18063] FAT-fs (loop3): Directory bread(block 64) failed [ 338.750204][T18063] FAT-fs (loop3): Directory bread(block 65) failed [ 338.757212][T18063] FAT-fs (loop3): Directory bread(block 66) failed [ 338.758065][T18059] FAT-fs (loop2): Directory bread(block 68) failed [ 338.764136][T18063] FAT-fs (loop3): Directory bread(block 67) failed [ 338.778115][T18063] FAT-fs (loop3): Directory bread(block 68) failed [ 338.784820][T18063] FAT-fs (loop3): Directory bread(block 69) failed [ 338.787680][T18059] FAT-fs (loop2): Directory bread(block 69) failed [ 338.792079][T18063] FAT-fs (loop3): Directory bread(block 70) failed [ 338.804715][T18063] FAT-fs (loop3): Directory bread(block 71) failed [ 338.809269][T18059] FAT-fs (loop2): Directory bread(block 70) failed [ 338.811514][T18063] FAT-fs (loop3): Directory bread(block 72) failed [ 338.820140][T18059] FAT-fs (loop2): Directory bread(block 71) failed [ 338.829011][T18063] FAT-fs (loop3): Directory bread(block 73) failed executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x46c) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r2, 0x6256, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r1) [ 338.831623][T18059] FAT-fs (loop2): Directory bread(block 72) failed [ 338.853703][T18059] FAT-fs (loop2): Directory bread(block 73) failed executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020d3"]) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, 0x0) [ 338.928318][T18091] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 338.929193][T18059] syz-executor.2: attempt to access beyond end of device [ 338.929193][T18059] loop2: rw=0, sector=1192, nr_sectors = 4 limit=256 [ 338.936244][T18063] syz-executor.3: attempt to access beyond end of device [ 338.936244][T18063] loop3: rw=0, sector=1192, nr_sectors = 4 limit=256 [ 338.952484][T18091] vhci_hcd: default hub control req: d300 v0000 i0000 l0 executing program 3: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000007b00000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@newtaction={0x98, 0x30, 0x301, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0x2a}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) executing program 4: r0 = open$dir(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000500)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') renameat(r2, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="85000000110000003500000000000000040000002a0000009500000000000000f4670880271efa95b2c8c037c5a142c9a8d76287066c51adde96fcc309926fa397fabd5f9810e81ae0b737126ea6f7be39cd34d5ae35de38dde54704d25c79949c00a7c09cc28d7673294f42a5f0a8320e13fecd45c0f8612c10b100000000b0d3712c7e93363af3c075ff1e23166a32d95433008000000000000051e1cc4c45d576090c4867a7b62a7e73a0c14e97dc30fd4b393e366c6386d5ec7209d031f40f3012e9576e51a7f578602f07785b92e544fc46c744ae6af3e4195cc037102124d85cec074c6949e1298901ebb39522f6649dd76d067a82f5fe47fe5f17f9ab800f4104dbaba46aa43a815a1e5c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c410ef4b253d110ee282ab7894de93d928cf95846be6277c04b48556c870814ec532b66a696a623cd8a4f8dc8dcba00b1b2d2747c4070052087b5efabf8496b9a951667d510ba0e3c4c00356ffebfb19a34268335648e1f844ce328c10752a42dca52fb98c1452b6518a6ef7297f7b3d0cd46dafc6ac5500f53e5309ec91d83cf4fbd775d9c07d8d591a4d8c60ff000000b78863e629b3b200000000000000000000000000008b00000000446308773974c87e080000003126af7a8b20744ea9875b9cba735b9594aa904e5a4bb2c3dfa80564e3e7000860000000004a2147c1128c697d9966b3c9f0e9e203911a3fac921a4fc6e625247510bc24e20ad88d3442a5d143c3047dd08e56a1b9764270c6ab800451b95e22f30a85f5681ca300000000af89a79b92a2c6743e478bd799415b6000f51168b71714bada12041752e2fcf95c1ced98fdc4f4bf2157b261380307d943b34c489734d55c4e15bbda5f5e31371c5330d920b71fbaaabd57ae73201b47f2c7e54ab19c60151feaefe69a798f3c14f969fab1005e8ccedd9c46c3e39f949dd4c87ae724ef73e2abdb4485027139e9445f77e8dd3af90248ede241b408a320e069f6becd0b8405d24f6d757fbc743673430d92a7f61c767e074df7881b3d31757d9649575cd08594cf403cd7223b77f3824faf4ffd4324f64acc76ea0d0f52af6c7ca8df71cbf0225907190eb446223b40bda4230ad5c77b04efc2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722880b6c2a7", 0x0, 0x8000}, 0x28) [ 338.972251][T18063] syz-executor.3: attempt to access beyond end of device [ 338.972251][T18063] loop3: rw=0, sector=1192, nr_sectors = 4 limit=256 [ 338.979678][T18059] syz-executor.2: attempt to access beyond end of device [ 338.979678][T18059] loop2: rw=0, sector=1192, nr_sectors = 4 limit=256 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000100)=@udp6}, 0x20) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000080), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000005, 0x10012, r2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000040)=0x8) executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x9, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000340)={r0, &(0x7f0000000180), 0x0}, 0x20) executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) executing program 4: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x6}, &(0x7f0000000100)=0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2010000, &(0x7f0000000180), 0x23, 0x33e, &(0x7f0000000500)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, "837ad552eed22b08", "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0x8000c61) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc042, 0x0) sendfile(r2, r2, 0x0, 0x40000000fffff803) executing program 3: r0 = memfd_create(&(0x7f00000001c0)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb80x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="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", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000c80)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @local, {[@rr={0x7, 0x3, 0x27}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) [ 339.303489][T18127] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 339.320692][T18127] vhci_hcd: default hub control req: d300 v0000 i0000 l0 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01fd201ebe00000000000f000000080001"], 0x24}}, 0x0) executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x34}}, 0x0) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x7667, &(0x7f0000000080), 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) syz_io_uring_setup(0x1d30, &(0x7f0000000080), 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) pselect6(0x40, &(0x7f0000000000)={0x1fe}, 0x0, 0x0, 0x0, 0x0) [ 339.395233][T18147] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 339.519740][T18153] Â: renamed from pim6reg1 executing program 0: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001300a7cc4a372eaf541d002007000000", @ANYRES32=r1, @ANYBLOB="00000000100000001c001a80080002802d00ff0008000200", @ANYRES32, @ANYRES16=r2], 0x44}}, 0x0) executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020d3"]) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, 0x0) executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x2, 0xffffffffffffffff, &(0x7f0000000080)) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000c80)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @local, {[@rr={0x7, 0x3, 0x27}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) executing program 1: socket$key(0xf, 0x3, 0x2) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x11}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0xc, &(0x7f00000000c0), 0x1, 0x10, 0x0, 0x201, 0x0, 0x0, 0x40000}, 0x90) executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) recvmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) shutdown(r0, 0x0) executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x8, 0x90, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x8, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000400000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000046320000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffc2001}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x61, 0x420004}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="b1aaaaaaaaaabbbbbbbbbbbb86dd6000000000102b00fc020000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000001000010600"/20, @ANYRES32, @ANYBLOB="0000000000000000180012800e000100776972656775617264000000040005"], 0x38}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000f0000002c000000020000000000000001"], 0x0, 0x46}, 0x20) bpf$ITER_CREATE(0xb, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="cf488190e610e8c014853e5c8eea917335845f91f7a8aa486999a3113aa36c166fedec83ed8861d6b9fd658e08ed9562c22c3c32b55473d4c31291a2627163dcb78911a768dbe6df312d8f437b553499ad6dcf3e57b882d240f53a92a27856a14a462ff6ee30c74e692851e87018d63dcbc776d0f93f08f7633ac3ec309ec3f381a690cecc2966917b53b11c176133eead313a92597397b0332748049e9d87c6bbbcd0e48a22b70481efd491dfbe6c281e3465e87b6ae61870a8a1f93845f8ded3805d6ba3", 0xc5, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000440)=@ax25={{0x3, @null}, [@remote, @rose, @netrom, @bcast, @null, @rose, @remote, @bcast]}, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000006c0)=""/189}, {&(0x7f00000004c0)=""/92}, {&(0x7f0000000780)=""/181}, {&(0x7f0000000880)=""/200}, {&(0x7f0000000980)=""/252}, {&(0x7f0000000a80)=""/94}, {&(0x7f0000000b00)=""/192}, {&(0x7f0000000bc0)=""/194}], 0x0, &(0x7f0000000d40)=""/211}}], 0x1d, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$MAP_CREATE_CONST_STR(0x1d, 0x0, 0x0) [ 339.608059][T18160] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 339.639468][T18160] vhci_hcd: default hub control req: d300 v0000 i0000 l0 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000c80)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @local, {[@rr={0x7, 0x3, 0x27}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x42202) unshare(0x42000000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d001800ea11c21d0005000000", 0x29}], 0x1) executing program 4: r0 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r0, 0x10d, 0x0, 0x0, 0xfffffffffffffffd) executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000100)=@udp6}, 0x20) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000080), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000005, 0x10012, r2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000040)=0x8) executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x8, 0x90, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x8, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000400000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000046320000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="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", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffc2001}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x61, 0x420004}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="b1aaaaaaaaaabbbbbbbbbbbb86dd6000000000102b00fc020000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000001000010600"/20, @ANYRES32, @ANYBLOB="0000000000000000180012800e000100776972656775617264000000040005"], 0x38}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000f0000002c000000020000000000000001"], 0x0, 0x46}, 0x20) bpf$ITER_CREATE(0xb, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="cf488190e610e8c014853e5c8eea917335845f91f7a8aa486999a3113aa36c166fedec83ed8861d6b9fd658e08ed9562c22c3c32b55473d4c31291a2627163dcb78911a768dbe6df312d8f437b553499ad6dcf3e57b882d240f53a92a27856a14a462ff6ee30c74e692851e87018d63dcbc776d0f93f08f7633ac3ec309ec3f381a690cecc2966917b53b11c176133eead313a92597397b0332748049e9d87c6bbbcd0e48a22b70481efd491dfbe6c281e3465e87b6ae61870a8a1f93845f8ded3805d6ba3", 0xc5, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000440)=@ax25={{0x3, @null}, [@remote, @rose, @netrom, @bcast, @null, @rose, @remote, @bcast]}, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000006c0)=""/189}, {&(0x7f00000004c0)=""/92}, {&(0x7f0000000780)=""/181}, {&(0x7f0000000880)=""/200}, {&(0x7f0000000980)=""/252}, {&(0x7f0000000a80)=""/94}, {&(0x7f0000000b00)=""/192}, {&(0x7f0000000bc0)=""/194}], 0x0, &(0x7f0000000d40)=""/211}}], 0x1d, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = open$dir(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000500)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') renameat(r2, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="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", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000c80)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @local, {[@rr={0x7, 0x3, 0x27}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000013c0), r0) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001440)={0x20, r1, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}}, 0x0) [ 340.008451][T18188] Â: renamed from pim6reg1 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffc2001}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x61, 0x420004}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="b1aaaaaaaaaabbbbbbbbbbbb86dd6000000000102b00fc020000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000001000010600"/20, @ANYRES32, @ANYBLOB="0000000000000000180012800e000100776972656775617264000000040005"], 0x38}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 340.120558][T18212] Â: renamed from pim6reg1 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x8, 0x90, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x8, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000400000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000046320000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) executing program 4: prctl$PR_MCE_KILL(0x23, 0x1, 0x7fffffffeffe) executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) set_tid_address(0x0) executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffc2001}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x61, 0x420004}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="b1aaaaaaaaaabbbbbbbbbbbb86dd6000000000102b00fc020000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000001000010600"/20, @ANYRES32, @ANYBLOB="0000000000000000180012800e000100776972656775617264000000040005"], 0x38}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030400fefdffffff000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0), 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sendmsg$unix(r4, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x50}, 0x0) r7 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x80, 0xfb, 0x3f, 0xf9, 0x3, 0x0, 0x80, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x661d, 0x0, @perf_config_ext={0x6, 0x80}, 0x40, 0x1, 0x101, 0x9, 0x90, 0x80000000, 0x3ff, 0x0, 0x400, 0x0, 0xffffffff}, r3, 0x10, r2, 0x8) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x3, 0x5, 0x5, 0x6b, 0x0, 0x8000, 0x2980, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x6, @perf_bp={&(0x7f00000001c0), 0x4}, 0x10, 0x1ca, 0x8, 0x1, 0x75, 0x800, 0x5, 0x0, 0x2, 0x0, 0x2}, r6, 0x8, r7, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(r8, 0x8941, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000440000004400000003000000100000000000000e0500000000000000060000000000000a01000000feffffff00000001000000004f00130404000000000000020100000000000000000000ca50000000002e35"], &(0x7f0000000240)=""/164, 0xffffffffffffff4b, 0xa4, 0x1, 0x1f}, 0x20) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'blkio'}, {0x2b, 'net_prio'}, {0x2d, 'rdma'}, {0x2b, 'memory'}, {0x2d, 'net_prio'}, {0x2b, 'blkio'}, {0x2b, 'rlimit'}, {0x2b, 'cpu'}, {0xd6e3c764b1ee2de3, 'pids'}]}, 0x43) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='block_split\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {0x85, 0x0, 0x0, 0x8b}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x7f) write$cgroup_int(r10, &(0x7f0000000200), 0x43451) executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="6dbe1c0a0e35ddc2f6c88998851b8816ae536502893d4542050e1c345ce254c99b4e9d928ea934876ada750a237578177082a41fb4c226361dfb44b9080f37bc799c46f46035a78552078b5a27b9624ed6530005d6ddd3a51a337e3fc50cbd596779880b6e6bd125fa0fd2118fdfd059617436c5759ce1e1f912d632086faa201c52ccdb0b5d93485f75ecd7593ef72934ca42231e11b58adf98e25471f54f2ba7ed97797746751c2c56c16029f1c7bc0af9ca31e5b19d758c66e42ed15fab79f8f5d7ef13770dfc7f01bab71acef666bdc7e3e048c666a2168b46a19c7678fc7a963d45f81401fe03105c349dce50a7e4aaac23a6797c6e25879249af0225af3f4422c194a84ec1e7dd78ac3387e65654115c3a8ca92d7283c9463708434b1614bd1ea72063d873cf6c8f39296bde4a599e6ce3d744023399ee17e725fb88e0ccff05bf276ad05da4a8f8f0972a003c7c33136aad9135bbad7145417ffe9fe32b96c676763b4869fec9b64c036afa78f79883a785e6d0c055ae2cdafb8a7b3be1aebc2e59d0df76e99c86b2eb711d86329514ba2577138664e27e04c0b279d5d9763ae243f0d71e2613391a3fddd3a62bd02bc5aba33b6d63da1f4689c6aa7f885fbc0ce0c659840ad2a95948f5f29d5c60411458f0b456ba2567408a0bad9696be8d9490ed1d79647af3432abd3d88fd1b6c178d059f9046e9bcf6a9086db86f6a611c", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="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", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x34, r1, 0x12ca589fdb765487, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x34}}, 0x0) executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) executing program 4: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) prlimit64(0x0, 0x2, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c832, 0xffffffffffffffff, 0x0) brk(0x20ffc000) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a34000000000a4f1c00000000000000000200000009000100859584b15cc0b28108000240000000020900010073797a310000000014000000110001"], 0x5c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x20, 0x7, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) executing program 1: unshare(0x62040200) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 340.739311][T18234] net_ratelimit: 5 callbacks suppressed [ 340.739327][T18234] MD5 Hash not found for [fe80::bb].0->[ff02::1].20002 [RP.]L3 index 0 [ 340.755865][T18234] Â: renamed from pim6reg1 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x42202) unshare(0x42000000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d001800ea11c21d0005000000", 0x29}], 0x1) executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) ptrace(0x4207, r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KIOCSOUND(r1, 0x4bfa, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940), 0x24}}, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000200)) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff3, 0xffff}, {0x0, 0xe}}}, 0x24}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c004603640000dbdf250a008000201e9bcc51294fb5b78e46d8967ec10000000050b444dab42bfb2e78fea3d9b19c4f47130de7a590", @ANYRES32=r7, @ANYBLOB="0000000008000200020000000800020007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x20008000) ptrace$setopts(0x4205, r0, 0x402, 0x20000000) [ 341.017080][T18255] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 341.029495][T18230] MD5 Hash not found for [fe80::bb].0->[ff02::1].20002 [RP.]L3 index 0 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030400fefdffffff000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0), 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sendmsg$unix(r4, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x50}, 0x0) r7 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x80, 0xfb, 0x3f, 0xf9, 0x3, 0x0, 0x80, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x661d, 0x0, @perf_config_ext={0x6, 0x80}, 0x40, 0x1, 0x101, 0x9, 0x90, 0x80000000, 0x3ff, 0x0, 0x400, 0x0, 0xffffffff}, r3, 0x10, r2, 0x8) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x3, 0x5, 0x5, 0x6b, 0x0, 0x8000, 0x2980, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x6, @perf_bp={&(0x7f00000001c0), 0x4}, 0x10, 0x1ca, 0x8, 0x1, 0x75, 0x800, 0x5, 0x0, 0x2, 0x0, 0x2}, r6, 0x8, r7, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(r8, 0x8941, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000440000004400000003000000100000000000000e0500000000000000060000000000000a01000000feffffff00000001000000004f00130404000000000000020100000000000000000000ca50000000002e35"], &(0x7f0000000240)=""/164, 0xffffffffffffff4b, 0xa4, 0x1, 0x1f}, 0x20) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'blkio'}, {0x2b, 'net_prio'}, {0x2d, 'rdma'}, {0x2b, 'memory'}, {0x2d, 'net_prio'}, {0x2b, 'blkio'}, {0x2b, 'rlimit'}, {0x2b, 'cpu'}, {0xd6e3c764b1ee2de3, 'pids'}]}, 0x43) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='block_split\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {0x85, 0x0, 0x0, 0x8b}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x7f) write$cgroup_int(r10, &(0x7f0000000200), 0x43451) executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x2000858, &(0x7f0000000500)=ANY=[], 0x5, 0x2d6, &(0x7f0000000200)="$eJzs3E1PE2sUwPHTUkopgXZxc2/uTW44uXejmwnUvbExkBibSJAaXxLjAFNtOrak02BqjOjKrfFDuCAs2ZEoX4CNO1du3LExcSEL45jOCxQogoVSXv6/hMyB85zyPFMg55kws3779eNSwTEKZk2iCZWIiMiGSFqiEooEx6gXx6XZC7k48PXjvzfv3L2ezeXGJlXHs1OXMqo6NPzuybP+YNhKn6yl769/yXxe+3Pt7/UfU4+KjhYdLVdqaup05VPNnLYtnS06JUN1wrZMx9Ji2bGqfr7i5wt2ZW6urmZ5djA5V7UcR81yXUtWXWsVrVXraj40i2U1DEMHk4L95BcnJ81sm8UzRzwZdEi1mjV7RKR/Vya/2JUJAQCArtrZ/0cbLX07/X+sZf+/9N9qbeDW8lDQ/6/EG/2/SFP//2Drtbb1/wkR6Xj/v7sjOltc99f5Q/X/OCUa/X8y+P31vLy3NOIF9P8AAAAAAAAAAAAAAAAAAAAAAJwGG66bcl03FR7Djz4RSXh3kPifd3ue6Aze//Nt68EdsSER+9V8fj7vH4MBqyJiiyUjkpLv3s9DoBGH9wJqQ1re2wtB/cJ8vsfLZAtS9OpHJSXpnfWuO34tNzaqvu31vZJsrs9ISv5oXZ9pWR+XC/831RuSkg8zUhFbZoM748L656OqV2/kdtT3e+MAAAAAADgLDN20uX/va84bu/P+/tjPb+6vW14f8PfXIy335zH5J9atVQMAAAAAcL449acl07at6pkLwhUetCr8X4Y9xkQkslfqCILwm5+MU3eAINrWVIfjv/mmtAzCy0Z7jZGJdl7ZTYkc9rT89ebtt6M7z5eXE/ustGNB7/H9BQIAAABwXLaa/vArV7o7IQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzqHjeJxYt9cIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBQ/AwAA//8Kygul") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x13, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000004b80)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}}], 0x1, 0x0) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xf}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffc2001}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x61, 0x420004}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="b1aaaaaaaaaabbbbbbbbbbbb86dd6000000000102b00fc020000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000001000010600"/20, @ANYRES32, @ANYBLOB="0000000000000000180012800e000100776972656775617264000000040005"], 0x38}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 341.243875][T18264] loop0: detected capacity change from 0 to 128 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38010000100033060000000000000000e0000002000000000000000000000000fe8000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0xc0855) r1 = socket(0x1d, 0x2, 0x6) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x6a, 0x1, 0x0, 0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r7 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6tnl0\x00', r6, 0x29, 0x3f, 0x0, 0x2, 0x20, @local, @loopback, 0x8, 0x10, 0x80000000}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000880)={'gretap0\x00', r8, 0xeaa114066d90bb8a, 0x1, 0xf6, 0x8001, {{0x39, 0x4, 0x3, 0x7, 0xe4, 0x64, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x24}, @local, {[@timestamp_prespec={0x44, 0x34, 0xf6, 0x3, 0x6, [{@multicast1, 0xfffffffa}, {@loopback}, {@loopback, 0x7ff}, {@rand_addr=0x64010100, 0x7}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}]}, @cipso={0x86, 0x25, 0x0, [{0x5, 0xf, "ad6565efab02466ee65562dcd4"}, {0x1, 0xe, "38cbd7b9587f5f5992f87130"}, {0x6, 0x2}]}, @noop, @timestamp_prespec={0x44, 0xc, 0x89, 0x3, 0x6, [{@multicast1, 0x7f}]}, @rr={0x7, 0x7, 0xf3, [@remote]}, @timestamp={0x44, 0x10, 0x83, 0x0, 0x1, [0x8, 0x1, 0x9]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x13, 0xa8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x33}, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xfc, 0x1, 0xe, [{@remote, 0x1000}, {@broadcast, 0x401}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x1}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x8b1}, {@multicast2, 0x4}]}]}}}}}) sendmsg$nl_route(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) getsockname$packet(r7, &(0x7f0000000a40)={0x11, 0x0, 0x0}, &(0x7f0000000a80)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', r6, 0x4, 0x0, 0xff, 0x8, 0x7c, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x7, 0x8001}}) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r15) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r14, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r16, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r16, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b80)={0x100, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x44090) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x24000000) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="080300001800040001000000ffdbdf2500000000000000000000000000000001ff0200000000000000000000000000014e20080000000000000080206c000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYBLOB="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"], 0x308}, 0x1, 0x0, 0x0, 0x80004}, 0x0) executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38010000100033060000000000000000e0000002000000000000000000000000fe8000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0xc0855) r1 = socket(0x1d, 0x2, 0x6) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x6a, 0x1, 0x0, 0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r7 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6tnl0\x00', r6, 0x29, 0x3f, 0x0, 0x2, 0x20, @local, @loopback, 0x8, 0x10, 0x80000000}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000880)={'gretap0\x00', r8, 0xeaa114066d90bb8a, 0x1, 0xf6, 0x8001, {{0x39, 0x4, 0x3, 0x7, 0xe4, 0x64, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x24}, @local, {[@timestamp_prespec={0x44, 0x34, 0xf6, 0x3, 0x6, [{@multicast1, 0xfffffffa}, {@loopback}, {@loopback, 0x7ff}, {@rand_addr=0x64010100, 0x7}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}]}, @cipso={0x86, 0x25, 0x0, [{0x5, 0xf, "ad6565efab02466ee65562dcd4"}, {0x1, 0xe, "38cbd7b9587f5f5992f87130"}, {0x6, 0x2}]}, @noop, @timestamp_prespec={0x44, 0xc, 0x89, 0x3, 0x6, [{@multicast1, 0x7f}]}, @rr={0x7, 0x7, 0xf3, [@remote]}, @timestamp={0x44, 0x10, 0x83, 0x0, 0x1, [0x8, 0x1, 0x9]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x13, 0xa8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x33}, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xfc, 0x1, 0xe, [{@remote, 0x1000}, {@broadcast, 0x401}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x1}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x8b1}, {@multicast2, 0x4}]}]}}}}}) sendmsg$nl_route(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) getsockname$packet(r7, &(0x7f0000000a40)={0x11, 0x0, 0x0}, &(0x7f0000000a80)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', r6, 0x4, 0x0, 0xff, 0x8, 0x7c, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x7, 0x8001}}) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r15) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r14, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r16, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r16, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b80)={0x100, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x44090) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x24000000) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="080300001800040001000000ffdbdf2500000000000000000000000000000001ff0200000000000000000000000000014e20080000000000000080206c000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYBLOB="fe8000000000000000000000000000bb000004d53c000000ac1414aa000000000000000000000000090000000000000003000000000000007f000000000000000000000000000080b6000000000000001c09000000000000060000000000000001000000000000000101000000000000f90a0000000000000600000000000000060000000000000006000000e1000000eba17c4d2bbd7000000000000000033b00000000000000000400000000000000080016007f00000008000c00070000000a001000010000000000000028001a00fe880000000000000000000000000001ac1414aa000000000000000000000000d34a201fcc01110000000000000000000000ffff7f000001fe80000000000000000000000000002dac1414bb000000000000000000000000fc0000000000000000000000000000006c010000033500000a00020064010101000000000000000000000000ac1414bb000000000000000000000000e000000100000000000000000000000000000000000000000000ffffffffffff3c010000043500000a000a007f000001000000000000000000000000ffffffff000000000000000000000000ac14140b000000000000000000000000000000000000000000000000000000003c050000000000000a000a000a010100000000000000000000000000fe8000000000000000000000000000bb6401010000000000000000000000000000000000000000000000000000000000c30000000535000002000a000a010102000000000000000000000000ff010000000000000000000000000001fc010000000000000000000000000000e00000020000000000000000000000002b0300000635000002000a00ffffffff000000000000000000000000fc010000000000000000000000000000ffffffff000000000000000000000000fe88000000000000000000000000010133040000003500000a000a00"], 0x308}, 0x1, 0x0, 0x0, 0x80004}, 0x0) [ 341.334286][T18269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 3: r0 = eventfd(0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000240), 0x8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) fcntl$setstatus(r0, 0x4, 0x800) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000005, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0xd, &(0x7f0000000080), &(0x7f0000000040)=0x8) [ 341.384826][T18271] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2103, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000e80)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@multicast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=ANY=[@ANYBLOB="340000001300290a00"/20, @ANYRES32=r1, @ANYBLOB="000000000000000414001a8010"], 0x34}}, 0x0) executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f40)={0x1, &(0x7f0000000f00)=[{0x6}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(r0) executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="d60a00000000000061117c00000000001800000000000000000000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000004000012000000180001801400020076657468315f746f5f626f6e640000000800070039"], 0x34}}, 0x0) [ 341.565180][ T28] audit: type=1326 audit(2000000123.689:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18288 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f390f679ea9 code=0x0 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38010000100033060000000000000000e0000002000000000000000000000000fe8000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0xc0855) r1 = socket(0x1d, 0x2, 0x6) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x6a, 0x1, 0x0, 0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r7 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6tnl0\x00', r6, 0x29, 0x3f, 0x0, 0x2, 0x20, @local, @loopback, 0x8, 0x10, 0x80000000}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000880)={'gretap0\x00', r8, 0xeaa114066d90bb8a, 0x1, 0xf6, 0x8001, {{0x39, 0x4, 0x3, 0x7, 0xe4, 0x64, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x24}, @local, {[@timestamp_prespec={0x44, 0x34, 0xf6, 0x3, 0x6, [{@multicast1, 0xfffffffa}, {@loopback}, {@loopback, 0x7ff}, {@rand_addr=0x64010100, 0x7}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}]}, @cipso={0x86, 0x25, 0x0, [{0x5, 0xf, "ad6565efab02466ee65562dcd4"}, {0x1, 0xe, "38cbd7b9587f5f5992f87130"}, {0x6, 0x2}]}, @noop, @timestamp_prespec={0x44, 0xc, 0x89, 0x3, 0x6, [{@multicast1, 0x7f}]}, @rr={0x7, 0x7, 0xf3, [@remote]}, @timestamp={0x44, 0x10, 0x83, 0x0, 0x1, [0x8, 0x1, 0x9]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x13, 0xa8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x33}, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xfc, 0x1, 0xe, [{@remote, 0x1000}, {@broadcast, 0x401}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x1}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x8b1}, {@multicast2, 0x4}]}]}}}}}) sendmsg$nl_route(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) getsockname$packet(r7, &(0x7f0000000a40)={0x11, 0x0, 0x0}, &(0x7f0000000a80)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', r6, 0x4, 0x0, 0xff, 0x8, 0x7c, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x7, 0x8001}}) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r15) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r14, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r16, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r16, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b80)={0x100, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x44090) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x24000000) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="080300001800040001000000ffdbdf2500000000000000000000000000000001ff0200000000000000000000000000014e20080000000000000080206c000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYBLOB="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"], 0x308}, 0x1, 0x0, 0x0, 0x80004}, 0x0) executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38010000100033060000000000000000e0000002000000000000000000000000fe8000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0xc0855) r1 = socket(0x1d, 0x2, 0x6) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x6a, 0x1, 0x0, 0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r7 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6tnl0\x00', r6, 0x29, 0x3f, 0x0, 0x2, 0x20, @local, @loopback, 0x8, 0x10, 0x80000000}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000880)={'gretap0\x00', r8, 0xeaa114066d90bb8a, 0x1, 0xf6, 0x8001, {{0x39, 0x4, 0x3, 0x7, 0xe4, 0x64, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x24}, @local, {[@timestamp_prespec={0x44, 0x34, 0xf6, 0x3, 0x6, [{@multicast1, 0xfffffffa}, {@loopback}, {@loopback, 0x7ff}, {@rand_addr=0x64010100, 0x7}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}]}, @cipso={0x86, 0x25, 0x0, [{0x5, 0xf, "ad6565efab02466ee65562dcd4"}, {0x1, 0xe, "38cbd7b9587f5f5992f87130"}, {0x6, 0x2}]}, @noop, @timestamp_prespec={0x44, 0xc, 0x89, 0x3, 0x6, [{@multicast1, 0x7f}]}, @rr={0x7, 0x7, 0xf3, [@remote]}, @timestamp={0x44, 0x10, 0x83, 0x0, 0x1, [0x8, 0x1, 0x9]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x13, 0xa8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x33}, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xfc, 0x1, 0xe, [{@remote, 0x1000}, {@broadcast, 0x401}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x1}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x8b1}, {@multicast2, 0x4}]}]}}}}}) sendmsg$nl_route(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) getsockname$packet(r7, &(0x7f0000000a40)={0x11, 0x0, 0x0}, &(0x7f0000000a80)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', r6, 0x4, 0x0, 0xff, 0x8, 0x7c, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x7, 0x7, 0x8001}}) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r15) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r14, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r16, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r16, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b80)={0x100, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x44090) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240), 0x48}}, 0x24000000) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005880)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {0x4000}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0x80000000}]}}]}, 0x38}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="080300001800040001000000ffdbdf2500000000000000000000000000000001ff0200000000000000000000000000014e20080000000000000080206c000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYBLOB="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"], 0x308}, 0x1, 0x0, 0x0, 0x80004}, 0x0) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}}, 0x0) executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="6dbe1c0a0e35ddc2f6c88998851b8816ae536502893d4542050e1c345ce254c99b4e9d928ea934876ada750a237578177082a41fb4c226361dfb44b9080f37bc799c46f46035a78552078b5a27b9624ed6530005d6ddd3a51a337e3fc50cbd596779880b6e6bd125fa0fd2118fdfd059617436c5759ce1e1f912d632086faa201c52ccdb0b5d93485f75ecd7593ef72934ca42231e11b58adf98e25471f54f2ba7ed97797746751c2c56c16029f1c7bc0af9ca31e5b19d758c66e42ed15fab79f8f5d7ef13770dfc7f01bab71acef666bdc7e3e048c666a2168b46a19c7678fc7a963d45f81401fe03105c349dce50a7e4aaac23a6797c6e25879249af0225af3f4422c194a84ec1e7dd78ac3387e65654115c3a8ca92d7283c9463708434b1614bd1ea72063d873cf6c8f39296bde4a599e6ce3d744023399ee17e725fb88e0ccff05bf276ad05da4a8f8f0972a003c7c33136aad9135bbad7145417ffe9fe32b96c676763b4869fec9b64c036afa78f79883a785e6d0c055ae2cdafb8a7b3be1aebc2e59d0df76e99c86b2eb711d86329514ba2577138664e27e04c0b279d5d9763ae243f0d71e2613391a3fddd3a62bd02bc5aba33b6d63da1f4689c6aa7f885fbc0ce0c659840ad2a95948f5f29d5c60411458f0b456ba2567408a0bad9696be8d9490ed1d79647af3432abd3d88fd1b6c178d059f9046e9bcf6a9086db86f6a611c", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380), 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0xd2, 0x0, &(0x7f00000000c0)) executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000140)=0x3, 0x2) executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), 0xffffffffffffffff) syz_emit_ethernet(0xda, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604f3fc400a40000fe8000000000000000000000000000aaff02000000000000000000000000000100100000000000000080"], 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x307, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'veth0_vlan\x00', &(0x7f00000006c0)}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000003c0)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x1c0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "6d93eb04697dfa39de04767f46614613a407abbf4ed2e83a63b484dbb3bf6b2a850e79009e2905d2f98ba19f91f3c9faee6d3686e9bee067f4e77d9ad66238750c4100d7ee97ec7646259d90edece6e9787a97bc956c01754c34c5c9518c46178ed5f9194454980e579c80eca35a58dc47d1d5e4ff6e216c724e88c702448587", 0x28}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @dev, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = socket(0x200000100000011, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xe48bdbbe6169fe17, r5, 0x4e3b6000) sendto$packet(r4, &(0x7f0000000100)="4dcdc7d96a760000000180040200000000000000", 0x5dc, 0x0, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0xbc, &(0x7f00000004c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @empty, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x6, 0x1, 0x1}}, {@llc={0x4, {@llc={0xaa, 0x4e, '.', "0571e52c256752bf33e6c2625a1fff5ac54d2b95c0b476ca3dc243786da4e40739037fe91bc38d365a9d00163ee8a5523b77e6c7b34f3ab9286a300f1023cbda6f8b08b6f93880c20fca2a085799edbc058d08c4fac8ae0cf1cbfa64bf85503b7419818a8b1dbfa454845bcf519294a7c77a52a3f804c90158c89540a168bc8a8cab6c80ca0fa9169c63b2f1b12295b0eb2b969665ea5083a8c3c261646e4f40783e6b"}}}}}, &(0x7f00000005c0)={0x0, 0x3, [0xdda, 0x3d6, 0x357, 0xdcb]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@RTM_NEWMDB={0xb8, 0x54, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x0, 0x1, {@ip4=@private=0xa010102, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x3, {@ip4=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x1, 0x0, {@in6_addr=@private1, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x2, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @local, 'bridge_slave_1\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'team_slave_1\x00'}}, 0x1e) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000200)={0x18, 0x0, {0x4, @local, 'veth0_vlan\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x4, @remote, 'bridge_slave_1\x00'}}) executing program 2: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket(0x1d, 0x2, 0x6) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = getpid() syz_pidfd_open(r1, 0x0) pipe(&(0x7f0000000100)) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="7fff000000000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r3, @ANYBLOB="08000a007551cb02a7"], 0x44}}, 0x0) executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000005, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0xd, &(0x7f0000000080), &(0x7f0000000040)=0x8) [ 342.028740][T18327] xt_TCPMSS: Only works on TCP SYN packets [ 342.056540][T18326] bond_slave_0: entered promiscuous mode [ 342.062297][T18326] bond_slave_1: entered promiscuous mode [ 342.092745][T18326] macsec1: entered promiscuous mode [ 342.098143][T18326] bond0: entered promiscuous mode [ 342.103641][T18326] macsec1: entered allmulticast mode [ 342.108965][T18326] bond0: entered allmulticast mode [ 342.114088][T18326] bond_slave_0: entered allmulticast mode [ 342.119873][T18326] bond_slave_1: entered allmulticast mode [ 342.125388][T18312] MD5 Hash not found for [fe80::bb].0->[ff02::1].20002 [RP.]L3 index 0 executing program 4: r0 = io_uring_setup(0x1b94, &(0x7f0000000000)) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080)={[{@errors_remount}, {@nodiscard}, {@noblock_validity}, {@noquota}, {@grpjquota}, {@noquota}, {@abort}, {@acl}, {@noload}]}, 0x64, 0x51d, &(0x7f0000000200)="$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") ioctl$TIOCSSOFTCAR(r1, 0x545c, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 342.157665][T18326] bond0: left allmulticast mode [ 342.162704][T18326] bond_slave_0: left allmulticast mode [ 342.168410][T18326] bond_slave_1: left allmulticast mode [ 342.174036][T18326] bond0: left promiscuous mode [ 342.179168][T18326] bond_slave_0: left promiscuous mode [ 342.184628][T18326] bond_slave_1: left promiscuous mode [ 342.232558][T18334] loop4: detected capacity change from 0 to 512 [ 342.251234][T18334] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 342.319565][T18334] EXT4-fs (loop4): orphan cleanup on readonly fs [ 342.331419][T18334] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz-executor.4: bg 0: block 248: padding at end of block bitmap is not set [ 342.350763][T18318] Â: renamed from pim6reg1 [ 342.351160][T18334] EXT4-fs (loop4): Remounting filesystem read-only executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380), 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0xd2, 0x0, &(0x7f00000000c0)) executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private}}]}]}, 0x4c}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setpriority(0x2, 0xff, 0x0) executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) recvmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) shutdown(r0, 0x0) [ 342.376386][T18334] Quota error (device loop4): write_blk: dquota write failed [ 342.385664][T18334] Quota error (device loop4): qtree_write_dquot: Error -117 occurred while creating quota executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000018000000000000000010000851000000000000000020000000000000000000100da"], 0x0, 0x52}, 0x20) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xf}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) [ 342.450333][T18334] EXT4-fs (loop4): 1 truncate cleaned up [ 342.458511][T18334] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002041, 0x0) executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x9, 0x0, "774c3302b1f1b066a380bfe207b87eee3eae02bd83c2a1221c61cc28de9738dd65a7087c64eb12c6b6de92c94c30ac369a9c40de052c528fa8db2e5e374fb46ca3db74fa6de1fc0d3b3daed2a0227652"}, 0xd8) executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="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", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) [ 342.495568][T18334] SELinux: (dev loop4, type ext4) getxattr errno 5 [ 342.509248][T18334] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x80006, 0x0, 0x6, 0x0, &(0x7f0000000000)) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6d6f651c2cb730303030303030e30e1c6ed3deb3f04bf1bcb08dac97c63030303030303030303030303030302c6d6f64653d30303038303030303030033030303030303030303030302c6d6f64653d30303030303030303030303030303030303030303030302c6d6f64653d30303030303030303030303030008000003030303030302c6d6f64653d30303030303030303030303030303030303030303030302c6d6f64653d303070486c3e30453030303030303030303030303030303030302c"]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, &(0x7f0000000200)) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000857200000000000000000000a500000008000000b70000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 2: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000480, &(0x7f0000000080), 0x45, 0x786, &(0x7f00000007c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getxattr(0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) fdatasync(r0) executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x3, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000580)="7cabc3", 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 4: r0 = eventfd(0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000240), 0x8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) fcntl$setstatus(r0, 0x4, 0x800) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) [ 342.709196][T18360] loop2: detected capacity change from 0 to 2048 [ 342.738260][T18360] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 342.756833][ T28] audit: type=1326 audit(2000000124.889:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 [ 342.850432][ T28] audit: type=1326 audit(2000000124.979:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 [ 342.874526][ T28] audit: type=1326 audit(2000000124.979:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=191 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 executing program 3: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000280)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='7'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {0x3, 0x0}, {0x5}, {}, {}, {}, {}, {0x7, 0x0, 0x0, 0x8}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb3}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 342.898654][ T28] audit: type=1326 audit(2000000124.979:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 [ 342.922681][ T28] audit: type=1326 audit(2000000124.979:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r2, 0x29, 0x7, 0x0, &(0x7f00000004c0)) executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), 0xffffffffffffffff) syz_emit_ethernet(0xda, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604f3fc400a40000fe8000000000000000000000000000aaff02000000000000000000000000000100100000000000000080"], 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x307, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'veth0_vlan\x00', &(0x7f00000006c0)}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000003c0)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x1c0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "6d93eb04697dfa39de04767f46614613a407abbf4ed2e83a63b484dbb3bf6b2a850e79009e2905d2f98ba19f91f3c9faee6d3686e9bee067f4e77d9ad66238750c4100d7ee97ec7646259d90edece6e9787a97bc956c01754c34c5c9518c46178ed5f9194454980e579c80eca35a58dc47d1d5e4ff6e216c724e88c702448587", 0x28}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @dev, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = socket(0x200000100000011, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xe48bdbbe6169fe17, r5, 0x4e3b6000) sendto$packet(r4, &(0x7f0000000100)="4dcdc7d96a760000000180040200000000000000", 0x5dc, 0x0, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0xbc, &(0x7f00000004c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @empty, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x6, 0x1, 0x1}}, {@llc={0x4, {@llc={0xaa, 0x4e, '.', "0571e52c256752bf33e6c2625a1fff5ac54d2b95c0b476ca3dc243786da4e40739037fe91bc38d365a9d00163ee8a5523b77e6c7b34f3ab9286a300f1023cbda6f8b08b6f93880c20fca2a085799edbc058d08c4fac8ae0cf1cbfa64bf85503b7419818a8b1dbfa454845bcf519294a7c77a52a3f804c90158c89540a168bc8a8cab6c80ca0fa9169c63b2f1b12295b0eb2b969665ea5083a8c3c261646e4f40783e6b"}}}}}, &(0x7f00000005c0)={0x0, 0x3, [0xdda, 0x3d6, 0x357, 0xdcb]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@RTM_NEWMDB={0xb8, 0x54, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x0, 0x1, {@ip4=@private=0xa010102, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x3, {@ip4=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x1, 0x0, {@in6_addr=@private1, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x2, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) [ 342.946768][ T28] audit: type=1326 audit(2000000124.979:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 [ 342.970760][ T28] audit: type=1326 audit(2000000124.979:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 [ 342.985149][T18361] Â: renamed from pim6reg1 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x9, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d40)={{r0, 0xffffffffffffffff}, &(0x7f0000001cc0), &(0x7f0000001d00)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000080), 0x0}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) write$binfmt_script(r5, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000040)=ANY=[@ANYBLOB="d8010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1d8}}, 0x0) [ 342.994753][ T28] audit: type=1326 audit(2000000124.979:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f72be6b2ea9 code=0x7ffc0000 [ 343.029985][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x9e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0xed00, 0x0, 0x0, 0x0, 0xa002c1a8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x24, 0x8, 0x0, 0x0, 0xb000}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xd, &(0x7f0000000740)=@framed={{}, [@ringbuf_output, @exit]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x1000, &(0x7f0000000d40)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0xd, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0xfffffffe, 0x1f, 0x800, 0xffffffffffffffff, 0x20, '\x00', r2, r3, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r3, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=ANY=[@ANYBLOB="380000001800dd8d0000000000000000020000000000000600000000060015000200000014001680100008"], 0x38}}, 0x0) executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) sendfile(r1, r3, 0x0, 0x0) close(r0) close_range(r1, 0xffffffffffffffff, 0x0) executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {0x3, 0x0}, {0x5}, {}, {}, {}, {}, {0x7, 0x0, 0x0, 0x8}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb3}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: r0 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x12, r0, 0x0) cachestat(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0xa00000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private}}]}]}, 0x4c}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setpriority(0x2, 0xff, 0x0) [ 343.147806][T18382] xt_TCPMSS: Only works on TCP SYN packets executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x9, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d40)={{r0, 0xffffffffffffffff}, &(0x7f0000001cc0), &(0x7f0000001d00)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000080), 0x0}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) write$binfmt_script(r5, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000040)=ANY=[@ANYBLOB="d8010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1d8}}, 0x0) executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r2, 0x29, 0x7, 0x0, &(0x7f00000004c0)) executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) open_tree(r0, &(0x7f0000000300)='\x00', 0x89901) executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002041, 0x0) executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), 0xffffffffffffffff) syz_emit_ethernet(0xda, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604f3fc400a40000fe8000000000000000000000000000aaff02000000000000000000000000000100100000000000000080"], 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x307, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'veth0_vlan\x00', &(0x7f00000006c0)}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000003c0)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x1c0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "6d93eb04697dfa39de04767f46614613a407abbf4ed2e83a63b484dbb3bf6b2a850e79009e2905d2f98ba19f91f3c9faee6d3686e9bee067f4e77d9ad66238750c4100d7ee97ec7646259d90edece6e9787a97bc956c01754c34c5c9518c46178ed5f9194454980e579c80eca35a58dc47d1d5e4ff6e216c724e88c702448587", 0x28}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @dev, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = socket(0x200000100000011, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xe48bdbbe6169fe17, r5, 0x4e3b6000) sendto$packet(r4, &(0x7f0000000100)="4dcdc7d96a760000000180040200000000000000", 0x5dc, 0x0, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0xbc, &(0x7f00000004c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @empty, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x6, 0x1, 0x1}}, {@llc={0x4, {@llc={0xaa, 0x4e, '.', "0571e52c256752bf33e6c2625a1fff5ac54d2b95c0b476ca3dc243786da4e40739037fe91bc38d365a9d00163ee8a5523b77e6c7b34f3ab9286a300f1023cbda6f8b08b6f93880c20fca2a085799edbc058d08c4fac8ae0cf1cbfa64bf85503b7419818a8b1dbfa454845bcf519294a7c77a52a3f804c90158c89540a168bc8a8cab6c80ca0fa9169c63b2f1b12295b0eb2b969665ea5083a8c3c261646e4f40783e6b"}}}}}, &(0x7f00000005c0)={0x0, 0x3, [0xdda, 0x3d6, 0x357, 0xdcb]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@RTM_NEWMDB={0xb8, 0x54, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x0, 0x1, {@ip4=@private=0xa010102, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x3, {@ip4=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x1, 0x0, {@in6_addr=@private1, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x2, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {0x3, 0x0}, {0x5}, {}, {}, {}, {}, {0x7, 0x0, 0x0, 0x8}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb3}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) read(r0, &(0x7f0000000240)=""/123, 0x7b) clock_adjtime(0x0, &(0x7f0000000040)={0xd51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}) executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='nonumtail=0,iocharset=cp950,umask=00000000000000000000000,uni_xlate=1,uni_xlate=1,shortname=win95,utf8=0,shortname=win95,utf8=1,uid=', @ANYRESHEX=0x0, @ANYBLOB=',shortname=winnt,uni_xlate=1,iocharset=maccroatian,iocharset=cp437,usefree,rodir,uid>', @ANYRES16, @ANYBLOB="2c2b4e578a63e77706115c2a114bef8e0d8d716ab8c0d6504161abb1cb27c81949fe4e3d45c3a19991e91f688efd8bb14dcef612"], 0x6, 0x2aa, &(0x7f0000000500)="$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") mkdirat(0xffffffffffffff9c, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$key(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) socket$inet(0x2, 0x4000000000080001, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x28, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x9c}}, 0x0) executing program 1: mq_unlink(&(0x7f0000000340)='eth0\x00') executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x9, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d40)={{r0, 0xffffffffffffffff}, &(0x7f0000001cc0), &(0x7f0000001d00)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000080), 0x0}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) write$binfmt_script(r5, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000040)=ANY=[@ANYBLOB="d8010000", @ANYRES16=r3, @ANYBLOB="010000000000fbdbdf25010000000800050001000000060006004e220000140002007767320000000000000000000000000024000400a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5427c0108800c01008006000500070000002400020086650b35f0b4c2dc04a95e352f55e8204db1e72262099a4daa6bd5d598d1ecdb24000100d1732899f611cd8994034d7f413dc957630e5493c285aca40065cb6311be696b1400040002004e24ac1e0001000000000000000008000300000000009c0009801c000080060001000200000008000200e0000002050003000300000028000080060001000a000000140002002001000000000000000000000000000105000300030000001c000080060001000200000008000200ac14140005"], 0x1d8}}, 0x0) executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000100000000000001000000760000000e000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) ioperm(0x0, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0), 0xfea7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, &(0x7f0000000000)={@local, @rand_addr, 0xfffc, "759532d5a146b07169b2b7340c8fcf886ec5ee9229238d5b9f5d0ffd0dc2e894", 0x0, 0xfffffff8}, 0x3c) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) io_setup(0x0, 0x0) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x4000) shmdt(0x0) shmctl$SHM_LOCK(0x0, 0xb) executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002041, 0x0) [ 343.323179][T18414] loop3: detected capacity change from 0 to 256 [ 343.337417][T18417] xt_TCPMSS: Only works on TCP SYN packets executing program 4: syz_mount_image$msdos(&(0x7f000001f800), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000004c0)={[{@dots}, {@dots}, {@nodots}, {}, {@nodots}, {@fat=@showexec}, {@dots}, {@fat=@quiet}, {@fat=@umask={'umask', 0x3d, 0x8b3}}, {@nodots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x1}}, {@dots}, {@fat=@discard}, {@fat=@showexec}, {@nodots}, {@dots}, {@fat=@tz_utc}, {@dots}, {@fat=@flush}, {@dots}, {@nodots}, {@nodots}]}, 0xfd, 0x1bf, &(0x7f0000000300)="$eJzs3TGL02AYB/Cn9bzmnG4TRCHg4nSon+BEThADgtJBJ4XT5SqCt0SX9mP4Af0A0qmLRGrSxkaHWmxS6++39En/edvnHZp26ZNXN99dnL+/fPvl+udIkl70T+M0Zr04jn4sTAIA2CezooivRanrXgCAdqzx/f+t5ZYAgC17/uLlkwdZdvYsTZOI6SQf5sPyscwfPc7O7qY/HNerpnk+vLLM76XN3w7z/Gpcq/L75fp0NT+MO7fLfJ49fJo18kGcb3frAAAAAAAAAAAAAAAAAAAAAADQmVuRLvx2vs/JSTM/qvLy6Kf5QI35PQdx46A6rMcDFeM2NgUAAAAAAAAAAAAAAAAAAAD/mMuPny5ej0ZvPtTFICJWn/mTole98IbL2y76sRNtKP5qke5GG6MNPwWHEbGtxmZFUax1cn2NGHR1cQIAAAAAAAAAAAAAAAAAgP9M/affX7Oki4YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoAP1/f83KMYRscbJyzc76nSrAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA7LHvAQAA///DgjXa") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./bus\x00', 0x0) unlinkat(r0, &(0x7f0000000340)='./bus\x00', 0x200) executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), 0xffffffffffffffff) syz_emit_ethernet(0xda, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604f3fc400a40000fe8000000000000000000000000000aaff02000000000000000000000000000100100000000000000080"], 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x307, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'veth0_vlan\x00', &(0x7f00000006c0)}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000003c0)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x1c0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "6d93eb04697dfa39de04767f46614613a407abbf4ed2e83a63b484dbb3bf6b2a850e79009e2905d2f98ba19f91f3c9faee6d3686e9bee067f4e77d9ad66238750c4100d7ee97ec7646259d90edece6e9787a97bc956c01754c34c5c9518c46178ed5f9194454980e579c80eca35a58dc47d1d5e4ff6e216c724e88c702448587", 0x28}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @dev, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = socket(0x200000100000011, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xe48bdbbe6169fe17, r5, 0x4e3b6000) sendto$packet(r4, &(0x7f0000000100)="4dcdc7d96a760000000180040200000000000000", 0x5dc, 0x0, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0xbc, &(0x7f00000004c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @empty, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x6, 0x1, 0x1}}, {@llc={0x4, {@llc={0xaa, 0x4e, '.', "0571e52c256752bf33e6c2625a1fff5ac54d2b95c0b476ca3dc243786da4e40739037fe91bc38d365a9d00163ee8a5523b77e6c7b34f3ab9286a300f1023cbda6f8b08b6f93880c20fca2a085799edbc058d08c4fac8ae0cf1cbfa64bf85503b7419818a8b1dbfa454845bcf519294a7c77a52a3f804c90158c89540a168bc8a8cab6c80ca0fa9169c63b2f1b12295b0eb2b969665ea5083a8c3c261646e4f40783e6b"}}}}}, &(0x7f00000005c0)={0x0, 0x3, [0xdda, 0x3d6, 0x357, 0xdcb]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@RTM_NEWMDB={0xb8, 0x54, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x0, 0x1, {@ip4=@private=0xa010102, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x3, {@ip4=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x1, 0x0, {@in6_addr=@private1, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x2, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) executing program 2: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {0x3, 0x0}, {0x5}, {}, {}, {}, {}, {0x7, 0x0, 0x0, 0x8}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb3}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: mq_unlink(&(0x7f0000000340)='eth0\x00') executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0xffffff8e, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'ip6gre0\x00', 0x0, 0x29, 0x1, 0x0, 0x48, 0x32, @private2, @dev={0xfe, 0x80, '\x00', 0x20}, 0x8000, 0x80, 0x2, 0x5}}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x6, 0x0, 0x0, 0x6a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{0x1, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)='%pB \x00'}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0xdd, 0x1f, 0x1a, 0x2940, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x20, &(0x7f0000000ec0)={&(0x7f0000000e00)=""/141, 0x8d, 0x0, &(0x7f0000001f40)=""/224, 0xe0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x1d, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa3bb, 0x0, 0x0, 0x0, 0xfffffffb}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xcf32}, @jmp={0x5, 0x1, 0x0, 0x3, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='syzkaller\x00', 0x8, 0xd3, &(0x7f00000002c0)=""/211, 0x41000, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xf, 0x3, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[r3, r4, r5, r6], &(0x7f0000000700)=[{0x5, 0x4, 0x2, 0x9}], 0x10, 0x1000}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000f40)=""/4089, 0x3e, 0xff9, 0x1}, 0x20) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x52, &(0x7f0000000280)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x8, 0xf989, "ef3f9eee"}]}}}}}}}}, 0x0) [ 343.403506][T18428] loop4: detected capacity change from 0 to 256 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x9, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d40)={{r0, 0xffffffffffffffff}, &(0x7f0000001cc0), &(0x7f0000001d00)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000080), 0x0}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) write$binfmt_script(r5, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000040)=ANY=[@ANYBLOB="d8010000", @ANYRES16=r3, @ANYBLOB="010000000000fbdbdf25010000000800050001000000060006004e220000140002007767320000000000000000000000000024000400a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5427c0108800c01008006000500070000002400020086650b35f0b4c2dc04a95e352f55e8204db1e72262099a4daa6bd5d598d1ecdb24000100d1732899f611cd8994034d7f413dc957630e5493c285aca40065cb6311be696b1400040002004e24ac1e0001000000000000000008000300000000009c0009801c000080060001000200000008000200e0000002050003000300000028000080060001000a000000140002002001000000000000000000000000000105000300030000001c000080060001000200000008000200ac14140005"], 0x1d8}}, 0x0) executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), 0xffffffffffffffff) syz_emit_ethernet(0xda, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604f3fc400a40000fe8000000000000000000000000000aaff02000000000000000000000000000100100000000000000080"], 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x307, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'veth0_vlan\x00', &(0x7f00000006c0)}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000003c0)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x1c0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "6d93eb04697dfa39de04767f46614613a407abbf4ed2e83a63b484dbb3bf6b2a850e79009e2905d2f98ba19f91f3c9faee6d3686e9bee067f4e77d9ad66238750c4100d7ee97ec7646259d90edece6e9787a97bc956c01754c34c5c9518c46178ed5f9194454980e579c80eca35a58dc47d1d5e4ff6e216c724e88c702448587", 0x28}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @dev, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = socket(0x200000100000011, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xe48bdbbe6169fe17, r5, 0x4e3b6000) sendto$packet(r4, &(0x7f0000000100)="4dcdc7d96a760000000180040200000000000000", 0x5dc, 0x0, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0xbc, &(0x7f00000004c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @empty, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x6, 0x1, 0x1}}, {@llc={0x4, {@llc={0xaa, 0x4e, '.', "0571e52c256752bf33e6c2625a1fff5ac54d2b95c0b476ca3dc243786da4e40739037fe91bc38d365a9d00163ee8a5523b77e6c7b34f3ab9286a300f1023cbda6f8b08b6f93880c20fca2a085799edbc058d08c4fac8ae0cf1cbfa64bf85503b7419818a8b1dbfa454845bcf519294a7c77a52a3f804c90158c89540a168bc8a8cab6c80ca0fa9169c63b2f1b12295b0eb2b969665ea5083a8c3c261646e4f40783e6b"}}}}}, &(0x7f00000005c0)={0x0, 0x3, [0xdda, 0x3d6, 0x357, 0xdcb]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@RTM_NEWMDB={0xb8, 0x54, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x0, 0x1, {@ip4=@private=0xa010102, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x3, {@ip4=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x1, 0x0, {@in6_addr=@private1, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x2, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@auto_da_alloc}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[], 0x386, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={'U+'}, 0x16, 0x0) utimes(&(0x7f0000000080)='./file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) executing program 4: syz_mount_image$msdos(&(0x7f000001f800), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000004c0)={[{@dots}, {@dots}, {@nodots}, {}, {@nodots}, {@fat=@showexec}, {@dots}, {@fat=@quiet}, {@fat=@umask={'umask', 0x3d, 0x8b3}}, {@nodots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x1}}, {@dots}, {@fat=@discard}, {@fat=@showexec}, {@nodots}, {@dots}, {@fat=@tz_utc}, {@dots}, {@fat=@flush}, {@dots}, {@nodots}, {@nodots}]}, 0xfd, 0x1bf, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./bus\x00', 0x0) unlinkat(r0, &(0x7f0000000340)='./bus\x00', 0x200) [ 343.464640][T18432] xt_TCPMSS: Only works on TCP SYN packets executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) ioperm(0x0, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0), 0xfea7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, &(0x7f0000000000)={@local, @rand_addr, 0xfffc, "759532d5a146b07169b2b7340c8fcf886ec5ee9229238d5b9f5d0ffd0dc2e894", 0x0, 0xfffffff8}, 0x3c) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) io_setup(0x0, 0x0) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x4000) shmdt(0x0) shmctl$SHM_LOCK(0x0, 0xb) executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\twmw'], 0xa) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x610af000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000ff4d22b44cd82c470181e1915676d3fd8e9383b7003a0738aa48f345ff7b342f23053416da628c6e395fc3dd77e2770794259774df1e20d2cd4550f8236c1139dbc87c7a7fae3ffeffec24cb9b9525ae02d6ffc3ae0b6266801cabeff798e1070e63f17ea3b678"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r5, 0x0, 0xe, 0x0, &(0x7f0000000340)="b2d908c91ad6a1c63be6789a2114", 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, &(0x7f0000000180)="d83c7804c67445ebc4d69b1c4fcaadbc8ffa11ccc93af0f07c6aa0cb2194d9314c1943edfe7119158c86b708f9c7f79311285317ce39e963f4c120e35eead91c2f9c21583b8ba09a7ebdfd3fa58f26c05c6ec4b053f49e52869d9d8521e9107c480969d6058ae5452bfd7f60f4e544a96965c972075752c39076abba8cd8b251329d1687ee2a2f1e1c8a7f7dd740a85b2a3e6d2ac81ca8b8054f3924ce21a37b63263c5afb6bb4fc55d4e2df242e82c25a81b5e400a38a35dae6de0ed0a03298"}, 0x50) write$binfmt_script(r4, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000780)=0x426b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x29) prctl$PR_SET_SECUREBITS(0x1b, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000040)={@private=0xa010101, @local}, 0x10) executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@auto_da_alloc}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[], 0x386, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={'U+'}, 0x16, 0x0) utimes(&(0x7f0000000080)='./file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) [ 343.514241][T18445] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 343.531305][T18448] loop3: detected capacity change from 0 to 512 [ 343.550966][T18454] loop4: detected capacity change from 0 to 256 executing program 4: mq_unlink(&(0x7f0000000340)='eth0\x00') [ 343.559010][T18448] EXT4-fs: Ignoring removed mblk_io_submit option [ 343.578415][T18450] xt_TCPMSS: Only works on TCP SYN packets [ 343.585241][T18457] loop2: detected capacity change from 0 to 512 [ 343.602962][T18457] EXT4-fs: Ignoring removed mblk_io_submit option executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = syz_io_uring_setup(0x690a, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x184c, 0x0, 0x0, 0x0, 0x0) executing program 1: mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000000, [{0x9, 0x43000000}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000f40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) [ 343.616612][T18457] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 343.616684][T18448] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 343.649235][T18457] EXT4-fs (loop2): 1 truncate cleaned up executing program 1: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40004}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80030000}, {}, {0x4}}}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x52, &(0x7f0000000280)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x8, 0xf989, "ef3f9eee"}]}}}}}}}}, 0x0) [ 343.654930][T18457] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 343.662889][T18448] EXT4-fs (loop3): 1 truncate cleaned up [ 343.673092][T18448] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 1: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x3810746, &(0x7f00000000c0)={[{@noauto_da_alloc}, {@user_xattr}, {@commit={'commit', 0x3d, 0x5}}, {@resuid}, {@stripe={'stripe', 0x3d, 0x4}}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@usrjquota}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0xc2, 0x0, &(0x7f00000000c0)) executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) write$P9_RGETLOCK(r0, &(0x7f00000004c0)={0x1e}, 0x1e) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\twmw'], 0xa) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x610af000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000ff4d22b44cd82c470181e1915676d3fd8e9383b7003a0738aa48f345ff7b342f23053416da628c6e395fc3dd77e2770794259774df1e20d2cd4550f8236c1139dbc87c7a7fae3ffeffec24cb9b9525ae02d6ffc3ae0b6266801cabeff798e1070e63f17ea3b678"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r5, 0x0, 0xe, 0x0, &(0x7f0000000340)="b2d908c91ad6a1c63be6789a2114", 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, &(0x7f0000000180)="d83c7804c67445ebc4d69b1c4fcaadbc8ffa11ccc93af0f07c6aa0cb2194d9314c1943edfe7119158c86b708f9c7f79311285317ce39e963f4c120e35eead91c2f9c21583b8ba09a7ebdfd3fa58f26c05c6ec4b053f49e52869d9d8521e9107c480969d6058ae5452bfd7f60f4e544a96965c972075752c39076abba8cd8b251329d1687ee2a2f1e1c8a7f7dd740a85b2a3e6d2ac81ca8b8054f3924ce21a37b63263c5afb6bb4fc55d4e2df242e82c25a81b5e400a38a35dae6de0ed0a03298"}, 0x50) write$binfmt_script(r4, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000780)=0x426b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x29) prctl$PR_SET_SECUREBITS(0x1b, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000040)={@private=0xa010101, @local}, 0x10) executing program 2: mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000000, [{0x9, 0x43000000}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000f40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2103, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) [ 343.776534][T17170] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 343.790580][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 343.808474][T18476] loop4: detected capacity change from 0 to 512 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0xce20, @empty}, 0x10) io_setup(0x8, &(0x7f0000000000)=0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) r4 = eventfd2(0x0, 0x0) io_submit(r2, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r2) writev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)="7e9adf65e9c6bafa", 0x8}], 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000440)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x44, 0x0, "e541bd3d3aa6a2d875e9671e8abcb31c134f3a9db8f52e1f54fe6e079f35ac63186c7244fc3b3801e79b8e5545b90f2dbec29f15cec2fd7e55d0345bce05c13ed90158fbdeb70322ea3188f81890e3db"}, 0xd8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x12c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x36}}, {0x14, 0x4, @empty}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x40}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @private=0xa010100}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_REPLY={0x44, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x5}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x9, 0xff}}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x9}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x280088c0}, 0x80) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @broadcast}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xd}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2c, 0x0, "6970db5e1a5e59ab54053861b182c1aa5bfa09d21b699379ab04eb29ee95bfd4aa2e83662eefcca878e3677208de36650006bfdf10d35ddf3148573cbc274287f6f94c55fc2a25f51f91b69e87873ea1"}, 0xd8) syz_clone(0x0, &(0x7f0000000040)="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", 0x204, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_emit_ethernet(0x17b, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000001450600fe8000000000000000000000000000bbff02000000000000000000000000000100004e22"], 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x32}}) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x52, &(0x7f0000000280)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x8, 0xf989, "ef3f9eee"}]}}}}}}}}, 0x0) executing program 4: io_uring_setup(0x3c47, &(0x7f0000000200)={0x0, 0xb5b6}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@auto_da_alloc}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[], 0x386, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={'U+'}, 0x16, 0x0) utimes(&(0x7f0000000080)='./file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) [ 343.831660][T18476] EXT4-fs (loop4): 1 orphan inode deleted [ 343.837495][T18476] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 343.865655][T17143] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_GROUP_ADDR={0xa, 0x14, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}]}}}]}, 0x40}}, 0x0) executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) syz_io_uring_setup(0x7b, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) dup3(r2, r0, 0x0) recvmmsg(r0, &(0x7f0000005100)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000700)=""/39, 0x27}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/207, 0xcf}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) executing program 4: ioperm(0x0, 0x7, 0x7) prctl$PR_MPX_DISABLE_MANAGEMENT(0x3b) executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x8001) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000040)=0xfffffffffffffc6f) r4 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000040)=0x8) [ 343.913766][T18490] loop2: detected capacity change from 0 to 512 [ 343.921210][T18490] EXT4-fs: Ignoring removed mblk_io_submit option [ 343.931214][T18490] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 343.954519][T18490] EXT4-fs (loop2): 1 truncate cleaned up executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x2000858, &(0x7f0000000500)=ANY=[], 0x5, 0x2d6, &(0x7f0000000200)="$eJzs3E1PE2sUwPHTUkopgXZxc2/uTW44uXejmwnUvbExkBibSJAaXxLjAFNtOrak02BqjOjKrfFDuCAs2ZEoX4CNO1du3LExcSEL45jOCxQogoVSXv6/hMyB85zyPFMg55kws3779eNSwTEKZk2iCZWIiMiGSFqiEooEx6gXx6XZC7k48PXjvzfv3L2ezeXGJlXHs1OXMqo6NPzuybP+YNhKn6yl769/yXxe+3Pt7/UfU4+KjhYdLVdqaup05VPNnLYtnS06JUN1wrZMx9Ji2bGqfr7i5wt2ZW6urmZ5djA5V7UcR81yXUtWXWsVrVXraj40i2U1DEMHk4L95BcnJ81sm8UzRzwZdEi1mjV7RKR/Vya/2JUJAQCArtrZ/0cbLX07/X+sZf+/9N9qbeDW8lDQ/6/EG/2/SFP//2Drtbb1/wkR6Xj/v7sjOltc99f5Q/X/OCUa/X8y+P31vLy3NOIF9P8AAAAAAAAAAAAAAAAAAAAAAJwGG66bcl03FR7Djz4RSXh3kPifd3ue6Aze//Nt68EdsSER+9V8fj7vH4MBqyJiiyUjkpLv3s9DoBGH9wJqQ1re2wtB/cJ8vsfLZAtS9OpHJSXpnfWuO34tNzaqvu31vZJsrs9ISv5oXZ9pWR+XC/831RuSkg8zUhFbZoM748L656OqV2/kdtT3e+MAAAAAADgLDN20uX/va84bu/P+/tjPb+6vW14f8PfXIy335zH5J9atVQMAAAAAcL449acl07at6pkLwhUetCr8X4Y9xkQkslfqCILwm5+MU3eAINrWVIfjv/mmtAzCy0Z7jZGJdl7ZTYkc9rT89ebtt6M7z5eXE/ustGNB7/H9BQIAAABwXLaa/vArV7o7IQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzqHjeJxYt9cIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBQ/AwAA//8Kygul") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x13, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000004b80)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}}], 0x1, 0x0) executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\twmw'], 0xa) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x610af000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000ff4d22b44cd82c470181e1915676d3fd8e9383b7003a0738aa48f345ff7b342f23053416da628c6e395fc3dd77e2770794259774df1e20d2cd4550f8236c1139dbc87c7a7fae3ffeffec24cb9b9525ae02d6ffc3ae0b6266801cabeff798e1070e63f17ea3b678"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r5, 0x0, 0xe, 0x0, &(0x7f0000000340)="b2d908c91ad6a1c63be6789a2114", 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, &(0x7f0000000180)="d83c7804c67445ebc4d69b1c4fcaadbc8ffa11ccc93af0f07c6aa0cb2194d9314c1943edfe7119158c86b708f9c7f79311285317ce39e963f4c120e35eead91c2f9c21583b8ba09a7ebdfd3fa58f26c05c6ec4b053f49e52869d9d8521e9107c480969d6058ae5452bfd7f60f4e544a96965c972075752c39076abba8cd8b251329d1687ee2a2f1e1c8a7f7dd740a85b2a3e6d2ac81ca8b8054f3924ce21a37b63263c5afb6bb4fc55d4e2df242e82c25a81b5e400a38a35dae6de0ed0a03298"}, 0x50) write$binfmt_script(r4, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000780)=0x426b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x29) prctl$PR_SET_SECUREBITS(0x1b, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000040)={@private=0xa010101, @local}, 0x10) [ 343.960306][T18490] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f40)={0x1, &(0x7f0000000f00)=[{0x6}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(r0) [ 344.028877][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) [ 344.078249][T18504] loop4: detected capacity change from 0 to 128 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x52, &(0x7f0000000280)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x8, 0xf989, "ef3f9eee"}]}}}}}}}}, 0x0) executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={0x0, 0x5, 0x1, "fd"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)={0x0, 0x0, 0x1, "a9"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x23, &(0x7f0000000340)={0x0, 0x5}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x5}, 0x8) executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000480, &(0x7f0000000080), 0x45, 0x786, &(0x7f00000007c0)="$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") prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getxattr(0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) fdatasync(r0) executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="5c00000012006bab9e3fe3d86e17aa31070000007ea60864160af365da8fb21a38001d008fbd983247f07251ca60bc24eab556a71a251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e450998530000000080bcc7f874", 0x5c}], 0x1, 0x0, 0x0, 0x1f000008}, 0x0) [ 344.216580][T18517] loop1: detected capacity change from 0 to 2048 [ 344.243669][T18521] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 344.252011][T18521] __nla_validate_parse: 10 callbacks suppressed executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), 0xffffffffffffffff) syz_emit_ethernet(0xda, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604f3fc400a40000fe8000000000000000000000000000aaff02000000000000000000000000000100100000000000000080"], 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, r1, 0x307, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'veth0_vlan\x00', &(0x7f00000006c0)}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000003c0)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x1c0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "6d93eb04697dfa39de04767f46614613a407abbf4ed2e83a63b484dbb3bf6b2a850e79009e2905d2f98ba19f91f3c9faee6d3686e9bee067f4e77d9ad66238750c4100d7ee97ec7646259d90edece6e9787a97bc956c01754c34c5c9518c46178ed5f9194454980e579c80eca35a58dc47d1d5e4ff6e216c724e88c702448587", 0x28}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @dev, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = socket(0x200000100000011, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xe48bdbbe6169fe17, r5, 0x4e3b6000) sendto$packet(r4, &(0x7f0000000100)="4dcdc7d96a760000000180040200000000000000", 0x5dc, 0x0, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0xbc, &(0x7f00000004c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @empty, @val={@val={0x88a8, 0x3, 0x0, 0x2}, {0x8100, 0x6, 0x1, 0x1}}, {@llc={0x4, {@llc={0xaa, 0x4e, '.', "0571e52c256752bf33e6c2625a1fff5ac54d2b95c0b476ca3dc243786da4e40739037fe91bc38d365a9d00163ee8a5523b77e6c7b34f3ab9286a300f1023cbda6f8b08b6f93880c20fca2a085799edbc058d08c4fac8ae0cf1cbfa64bf85503b7419818a8b1dbfa454845bcf519294a7c77a52a3f804c90158c89540a168bc8a8cab6c80ca0fa9169c63b2f1b12295b0eb2b969665ea5083a8c3c261646e4f40783e6b"}}}}}, &(0x7f00000005c0)={0x0, 0x3, [0xdda, 0x3d6, 0x357, 0xdcb]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@RTM_NEWMDB={0xb8, 0x54, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x0, 0x1, {@ip4=@private=0xa010102, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x3, {@ip4=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x1, 0x0, {@in6_addr=@private1, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x2, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) [ 344.252022][T18521] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 344.267731][T18521] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 344.271229][T18517] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 344.275988][T18521] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x29, 0x17, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) lchown(0x0, 0xee00, 0x0) creat(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x2, &(0x7f00000000c0)={&(0x7f0000000000)=""/156}, 0xeb) bpf$PROG_LOAD(0x5, 0x0, 0x0) executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\twmw'], 0xa) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x610af000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000ff4d22b44cd82c470181e1915676d3fd8e9383b7003a0738aa48f345ff7b342f23053416da628c6e395fc3dd77e2770794259774df1e20d2cd4550f8236c1139dbc87c7a7fae3ffeffec24cb9b9525ae02d6ffc3ae0b6266801cabeff798e1070e63f17ea3b678"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r5, 0x0, 0xe, 0x0, &(0x7f0000000340)="b2d908c91ad6a1c63be6789a2114", 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, &(0x7f0000000180)="d83c7804c67445ebc4d69b1c4fcaadbc8ffa11ccc93af0f07c6aa0cb2194d9314c1943edfe7119158c86b708f9c7f79311285317ce39e963f4c120e35eead91c2f9c21583b8ba09a7ebdfd3fa58f26c05c6ec4b053f49e52869d9d8521e9107c480969d6058ae5452bfd7f60f4e544a96965c972075752c39076abba8cd8b251329d1687ee2a2f1e1c8a7f7dd740a85b2a3e6d2ac81ca8b8054f3924ce21a37b63263c5afb6bb4fc55d4e2df242e82c25a81b5e400a38a35dae6de0ed0a03298"}, 0x50) write$binfmt_script(r4, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000780)=0x426b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x29) prctl$PR_SET_SECUREBITS(0x1b, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000040)={@private=0xa010101, @local}, 0x10) [ 344.326488][T18525] xt_TCPMSS: Only works on TCP SYN packets [ 344.351607][T18487] MD5 Hash not found for [fe80::bb].0->[ff02::1].20002 [RP.]L3 index 0 [ 344.360331][T18487] Â: renamed from pim6reg1 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000280)='./file0/bus\x00', 0x40000493) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000200)=""/63, 0x18) executing program 4: socket$inet6(0xa, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) [ 344.370637][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000857200000000000000000000a500000008000000b70000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000240)={0x10}, 0x10}], 0x1}, 0x0) bind$netlink(r0, &(0x7f0000001b40)={0x10, 0x0, 0x0, 0x100000}, 0xc) [ 344.467904][T18541] warn_alloc: 1 callbacks suppressed [ 344.467918][T18541] syz-executor.1: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 344.488413][T18541] CPU: 0 PID: 18541 Comm: syz-executor.1 Tainted: G W 6.9.0-rc4-syzkaller-00266-g977b1ef51866 #0 [ 344.500456][T18541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 344.510514][T18541] Call Trace: [ 344.513814][T18541] executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='jbd2_handle_stats\x00', r2}, 0x10) [ 344.516752][T18541] dump_stack_lvl+0xf2/0x150 [ 344.521364][T18541] dump_stack+0x15/0x20 [ 344.525585][T18541] warn_alloc+0x145/0x1b0 [ 344.529947][T18541] ? __vmalloc_node_range+0x89/0xee0 [ 344.535292][T18541] __vmalloc_node_range+0xa9/0xee0 [ 344.540572][T18541] ? __pfx_futex_wake_mark+0x10/0x10 [ 344.545885][T18541] ? __should_failslab+0x92/0xa0 [ 344.551044][T18541] vmalloc_user+0x59/0x70 [ 344.555402][T18541] ? xskq_create+0x79/0xd0 [ 344.559955][T18541] xskq_create+0x79/0xd0 [ 344.564316][T18541] xsk_init_queue+0x82/0xd0 [ 344.568841][T18541] xsk_setsockopt+0x409/0x520 [ 344.573540][T18541] ? __pfx_xsk_setsockopt+0x10/0x10 [ 344.578833][T18541] __sys_setsockopt+0x1d8/0x250 [ 344.583692][T18541] __x64_sys_setsockopt+0x66/0x80 [ 344.588760][T18541] x64_sys_call+0x1159/0x2d30 [ 344.593435][T18541] do_syscall_64+0xcd/0x1d0 [ 344.597938][T18541] ? clear_bhb_loop+0x55/0xb0 [ 344.602634][T18541] ? clear_bhb_loop+0x55/0xb0 [ 344.607364][T18541] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.613357][T18541] RIP: 0033:0x7f390f679ea9 [ 344.617762][T18541] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 344.637394][T18541] RSP: 002b:00007f390e9f30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 344.645811][T18541] RAX: ffffffffffffffda RBX: 00007f390f7a7f80 RCX: 00007f390f679ea9 [ 344.653772][T18541] RDX: 0000000000000002 RSI: 000000000000011b RDI: 0000000000000004 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) set_mempolicy(0x4003, &(0x7f0000000080)=0x7, 0x3) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 344.661853][T18541] RBP: 00007f390f6c64a4 R08: 00000000000000eb R09: 0000000000000000 [ 344.669814][T18541] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000000 [ 344.677774][T18541] R13: 000000000000000b R14: 00007f390f7a7f80 R15: 00007ffcb0d438a8 [ 344.685747][T18541] [ 344.688787][T18541] Mem-Info: [ 344.692721][T18541] active_anon:5306 inactive_anon:12417 isolated_anon:0 [ 344.692721][T18541] active_file:3328 inactive_file:14237 isolated_file:0 [ 344.692721][T18541] unevictable:0 dirty:4008 writeback:0 [ 344.692721][T18541] slab_reclaimable:3068 slab_unreclaimable:20580 [ 344.692721][T18541] mapped:30264 shmem:5422 pagetables:706 [ 344.692721][T18541] sec_pagetables:0 bounce:0 [ 344.692721][T18541] kernel_misc_reclaimable:0 [ 344.692721][T18541] free:1868396 free_pcp:3656 free_cma:0 [ 344.738382][T18541] Node 0 active_anon:21224kB inactive_anon:49784kB active_file:13312kB inactive_file:57064kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:121056kB dirty:16032kB writeback:0kB shmem:21688kB writeback_tmp:0kB kernel_stack:3488kB pagetables:2824kB sec_pagetables:0kB all_unreclaimable? no [ 344.766812][T18541] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 344.793984][T18541] lowmem_reserve[]: 0 2874 7852 7852 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff6ffc}]}) membarrier(0x40, 0x0) [ 344.799349][T18541] Node 0 DMA32 free:2957148kB boost:0kB min:4144kB low:7084kB high:10024kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2960784kB mlocked:0kB bounce:0kB free_pcp:3636kB local_pcp:96kB free_cma:0kB [ 344.828004][T18541] lowmem_reserve[]: 0 0 4978 4978 [ 344.833165][T18541] Node 0 Normal free:4499576kB boost:0kB min:7180kB low:12276kB high:17372kB reserved_highatomic:0KB active_anon:21224kB inactive_anon:49784kB active_file:13312kB inactive_file:61124kB unevictable:0kB writepending:20092kB present:5242880kB managed:5098208kB mlocked:0kB bounce:0kB free_pcp:8328kB local_pcp:896kB free_cma:0kB [ 344.863866][T18541] lowmem_reserve[]: 0 0 0 0 [ 344.868425][T18541] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 344.881111][T18541] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 1*2048kB (M) 720*4096kB (M) = 2957148kB [ 344.897628][T18541] Node 0 Normal: 1360*4kB (UME) 1551*8kB (UME) 910*16kB (UME) 473*32kB (UME) 259*64kB (UME) 154*128kB (UME) 127*256kB (UME) 123*512kB (UME) 95*1024kB (UME) 44*2048kB (UME) 1009*4096kB (UME) = 4499576kB executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x60, 0x2, {{0x2, [], 0x0, [0x4, 0x2], [0x0, 0x4]}, [@TCA_MQPRIO_SHAPER={0x6}]}}}]}, 0x90}}, 0x0) executing program 2: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000280)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='7'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 3: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000280)=[{0x4c}, {0x5}, {0x0, 0x0, 0x0, 0xffffefff}]}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @func_proto, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) executing program 0: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) [ 344.917472][T18541] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 344.926756][T18541] 24059 total pagecache pages [ 344.931411][T18541] 28 pages in swap cache [ 344.935709][T18541] Free swap = 123780kB [ 344.939855][T18541] Total swap = 124996kB [ 344.944018][T18541] 2097051 pages RAM [ 344.947832][T18541] 0 pages HighMem/MovableOnly [ 344.952489][T18541] 78463 pages reserved executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={0x0, 0x5, 0x1, "fd"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)={0x0, 0x0, 0x1, "a9"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x23, &(0x7f0000000340)={0x0, 0x5}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x5}, 0x8) executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x81fd) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000040)={&(0x7f0000000000), 0x6, &(0x7f0000000140)={&(0x7f0000002180)=ANY=[], 0x48}}, 0x0) executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x29, 0x17, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) lchown(0x0, 0xee00, 0x0) creat(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x2, &(0x7f00000000c0)={&(0x7f0000000000)=""/156}, 0xeb) bpf$PROG_LOAD(0x5, 0x0, 0x0) executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDENABIO(r1, 0x4b36) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pwritev2(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r2, 0x0) io_setup(0x6, &(0x7f0000000280)) executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[], 0x8) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}, 0x18) executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="5c00000012006bab9e3fe3d86e17aa31070000007ea60864160af365da8fb21a38001d008fbd983247f07251ca60bc24eab556a71a251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e450998530000000080bcc7f874", 0x5c}], 0x1, 0x0, 0x0, 0x1f000008}, 0x0) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='jbd2_handle_stats\x00', r2}, 0x10) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x60, 0x2, {{0x2, [], 0x0, [0x4, 0x2], [0x0, 0x4]}, [@TCA_MQPRIO_SHAPER={0x6}]}}}]}, 0x90}}, 0x0) executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={0x0, 0x5, 0x1, "fd"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)={0x0, 0x0, 0x1, "a9"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x23, &(0x7f0000000340)={0x0, 0x5}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x5}, 0x8) [ 345.078412][T18572] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 345.086744][T18572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 345.111995][T18572] netlink: 'syz-executor.2': attribute type 29 has an invalid length. executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000280)=[{0x4c}, {0x5}, {0x0, 0x0, 0x0, 0xffffefff}]}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @func_proto, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000280)='./file0/bus\x00', 0x40000493) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000200)=""/63, 0x18) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty, {[@cipso={0x86, 0xc, 0x3, [{0x1, 0x6, "3429ac38"}]}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 345.120336][T18572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1c}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x6c, &(0x7f0000000340)={r2}, &(0x7f00000000c0)=0x18) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'netdevsim0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x23, 0x1, 0x0, 0x0, {0x6}, [@nested={0x8, 0x1, 0x0, 0x1, [@generic="e139caec"]}]}, 0x1c}}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7d07001175f37538e486dd6317"], 0xfdef) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00'}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0900000003080103000000000000000000bdf95768f54b323fccfd430299565000fffc060002400000000005000300300000001407a8af767381b2911610b711a53fc46f00048008e2413c2e1a84bfdd61d6740004400000008108000240000000008a7c00000000000075162aabeac197cd1b19fe4203d952f8c7d03432dc7f1c88f6e73036528359b6255a042a9016a60eeee756634055e5f9ae302afbf996cd9d74568060ed03c3e17233905d0de9e608ebd57ffa1946b28e8da0a0286b0b37b8ce629f631be1581e464afd68b8aab1bee1c182b9a9984e6a16c06cff9e521f4397771fc5a03ab570641a00"/250], 0x38}, 0x1, 0x0, 0x0, 0x24040004}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='nonumtail=0,iocharset=cp950,umask=00000000000000000000000,uni_xlate=1,uni_xlate=1,shortname=win95,utf8=0,shortname=win95,utf8=1,uid=', @ANYRESHEX=0x0, @ANYBLOB=',shortname=winnt,uni_xlate=1,iocharset=maccroatian,iocharset=cp437,usefree,rodir,uid>', @ANYRES16, @ANYBLOB="2c2b4e578a63e77706115c2a114bef8e0d8d716ab8c0d6504161abb1cb27c81949fe4e3d45c3a19991e91f688efd8bb14dcef612"], 0x6, 0x2aa, &(0x7f0000000500)="$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") mkdirat(0xffffffffffffff9c, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$key(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) socket$inet(0x2, 0x4000000000080001, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x28, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x9c}}, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x34, r1, 0x431, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x34}}, 0x0) executing program 4: executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty, {[@cipso={0x86, 0xc, 0x3, [{0x1, 0x6, "3429ac38"}]}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) executing program 3: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000280)=[{0x4c}, {0x5}, {0x0, 0x0, 0x0, 0xffffefff}]}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @func_proto, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000008c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x80000000, 0x4) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000000, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000280)='./file0/bus\x00', 0x40000493) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000200)=""/63, 0x18) [ 345.260795][T18593] loop2: detected capacity change from 0 to 256 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x34, r1, 0x431, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x34}}, 0x0) executing program 1: setuid(0xee01) r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000100)={0x2a, 0x1, 0x1}, 0xc) executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000300)) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x7, 0xb}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/tcp_htcp', 0x2902, 0x0) executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0x104, 0x10, 0x201, 0x0, 0x0, {{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@local, 0x0, 0x2b}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21}, [@coaddr={0x14, 0xe, @in6=@loopback}]}, 0x104}}, 0x0) executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={0x0, 0x5, 0x1, "fd"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)={0x0, 0x0, 0x1, "a9"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x23, &(0x7f0000000340)={0x0, 0x5}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x5}, 0x8) executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1c}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x6c, &(0x7f0000000340)={r2}, &(0x7f00000000c0)=0x18) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty, {[@cipso={0x86, 0xc, 0x3, [{0x1, 0x6, "3429ac38"}]}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x34, r1, 0x431, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x34}}, 0x0) executing program 0: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000280)=[{0x4c}, {0x5}, {0x0, 0x0, 0x0, 0xffffefff}]}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @func_proto, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x80000000, 0x4) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000000, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x3810746, &(0x7f00000000c0)={[{@noauto_da_alloc}, {@user_xattr}, {@commit={'commit', 0x3d, 0x5}}, {@resuid}, {@stripe={'stripe', 0x3d, 0x4}}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@usrjquota}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0xc2, 0x0, &(0x7f00000000c0)) executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000300)) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x7, 0xb}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/tcp_htcp', 0x2902, 0x0) executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x18, {"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", 0x28d}}, 0x1006) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x20, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000079120f000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'lock', ' ', 'io+mem'}, 0xc) r1 = epoll_create(0xb398) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'unlock', ' ', 'io+mem'}, 0xe) executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1c}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x6c, &(0x7f0000000340)={r2}, &(0x7f00000000c0)=0x18) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, 0x0, 0x8, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @remote}]}}}]}, 0x44}}, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x34, r1, 0x431, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x34}}, 0x0) executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, 0x0, 0x8, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @remote}]}}}]}, 0x44}}, 0x0) [ 345.467197][T18629] loop2: detected capacity change from 0 to 512 [ 345.494466][T18629] EXT4-fs (loop2): 1 orphan inode deleted [ 345.500271][T18629] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0x104, 0x10, 0x201, 0x0, 0x0, {{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@local, 0x0, 0x2b}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21}, [@coaddr={0x14, 0xe, @in6=@loopback}]}, 0x104}}, 0x0) executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={0x0, 0x5, 0x1, "fd"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)={0x0, 0x0, 0x1, "a9"}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x23, &(0x7f0000000340)={0x0, 0x5}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x5}, 0x8) executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000300)) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x7, 0xb}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/tcp_htcp', 0x2902, 0x0) executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'lock', ' ', 'io+mem'}, 0xc) r1 = epoll_create(0xb398) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'unlock', ' ', 'io+mem'}, 0xe) executing program 4: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\twmw'], 0xa) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x610af000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000ff4d22b44cd82c470181e1915676d3fd8e9383b7003a0738aa48f345ff7b342f23053416da628c6e395fc3dd77e2770794259774df1e20d2cd4550f8236c1139dbc87c7a7fae3ffeffec24cb9b9525ae02d6ffc3ae0b6266801cabeff798e1070e63f17ea3b678"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r5, 0x0, 0xe, 0x0, &(0x7f0000000340)="b2d908c91ad6a1c63be6789a2114", 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, &(0x7f0000000180)="d83c7804c67445ebc4d69b1c4fcaadbc8ffa11ccc93af0f07c6aa0cb2194d9314c1943edfe7119158c86b708f9c7f79311285317ce39e963f4c120e35eead91c2f9c21583b8ba09a7ebdfd3fa58f26c05c6ec4b053f49e52869d9d8521e9107c480969d6058ae5452bfd7f60f4e544a96965c972075752c39076abba8cd8b251329d1687ee2a2f1e1c8a7f7dd740a85b2a3e6d2ac81ca8b8054f3924ce21a37b63263c5afb6bb4fc55d4e2df242e82c25a81b5e400a38a35dae6de0ed0a03298"}, 0x50) write$binfmt_script(r4, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000780)=0x426b) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x29) prctl$PR_SET_SECUREBITS(0x1b, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000040)={@private=0xa010101, @local}, 0x10) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, 0x0, 0x8, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @remote}]}}}]}, 0x44}}, 0x0) [ 345.583792][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: unshare(0x2000680) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, 0x0, 0x0) executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000340)={&(0x7f0000000780), 0x0}) r2 = dup3(r0, r1, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000d80)={&(0x7f0000000000), &(0x7f0000002e40)=""/4109, 0x100d}) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@RTM_DELMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x20, 0x1, {r2, 0x0, 0x0, 0x0, {@in6_addr=@private1, 0x86dd}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x18, 0x76, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6}}, 0x18}, 0x1, 0x5502000000000000}, 0x0) sendmsg$nl_route(r0, 0x0, 0x8000) executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000300)) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x7, 0xb}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/tcp_htcp', 0x2902, 0x0) executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0x104, 0x10, 0x201, 0x0, 0x0, {{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@local, 0x0, 0x2b}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21}, [@coaddr={0x14, 0xe, @in6=@loopback}]}, 0x104}}, 0x0) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=@newtaction={0x6c, 0x30, 0xb, 0x0, 0x0, {}, [{0x58, 0x1, [@m_ct={0x54, 0x1, 0x0, 0x0, {{0x7}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_MARK_MASK={0x8}, @TCA_CT_MARK={0x8}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x0) executing program 4: r0 = mq_open(&(0x7f0000000080)='.pending_reads\x00', 0x40, 0x0, &(0x7f0000000100)={0x0, 0x2, 0x5}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x5452, &(0x7f0000000140)) executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'lock', ' ', 'io+mem'}, 0xc) r1 = epoll_create(0xb398) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'unlock', ' ', 'io+mem'}, 0xe) executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x810b}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @dev, @void, {@ipv4={0x800, @icmp={{0xd, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @empty=0xac1414aa, @remote}}}}}}, 0x0) executing program 4: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000280)=[{0x4c}, {0x5}, {0x0, 0x0, 0x0, 0xffffefff}]}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @func_proto, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, 0x0, 0x8, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @remote}]}}}]}, 0x44}}, 0x0) executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x81fd) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000040)={&(0x7f0000000000), 0x6, &(0x7f0000000140)={&(0x7f0000002180)=ANY=[], 0x48}}, 0x0) executing program 4: io_uring_setup(0x3c47, &(0x7f0000000200)={0x0, 0xb5b6}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x9, 0x40, 0x1f, 0x8, 0x6, 0xffffffffffffffff, 0xffffffff}, 0x48) executing program 0: ioperm(0x0, 0x7, 0x7) prctl$PR_MPX_DISABLE_MANAGEMENT(0x3b) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@x, {0x2, 0x0, 0x3, 0xa, 0x0}, {0x5}, {0x6, 0x0, 0x2}, {}, {}, {0x85, 0x0, 0x0, 0x11}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1b) executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'lock', ' ', 'io+mem'}, 0xc) r1 = epoll_create(0xb398) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'unlock', ' ', 'io+mem'}, 0xe) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000008850000007600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xffffffffffffffff, 0x0, 0x0, {}, [{0x50, 0x1, [@m_bpf={0x4c, 0x1, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000280)=[{0x4c}, {0x5}, {0x0, 0x0, 0x0, 0xffffefff}]}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @func_proto, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) executing program 0: add_key(&(0x7f0000000100)='big_key\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0, 0x0) executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x78f7, &(0x7f0000000480), &(0x7f0000000500), &(0x7f0000000540)) executing program 4: syz_io_uring_setup(0x24fa, &(0x7f0000000280)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x6129, &(0x7f0000000600)={0x0, 0x0, 0x10100}, &(0x7f00000005c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x202}, &(0x7f00000002c0)='./bus\x00', 0x18}) io_uring_enter(r2, 0x291c, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}) socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) ftruncate(r6, 0x4) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2713, 0x0, &(0x7f00000000c0)) executing program 1: io_uring_setup(0x3c47, &(0x7f0000000200)={0x0, 0xb5b6}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x0, 0x111, 0x4b4, 0x150, 0x700, 0x298, 0x278, 0x278, 0x298, 0x278, 0x3, 0x0, {[{{@ipv6={@empty, @empty, [], [], 'vlan0\x00', 'team_slave_0\x00'}, 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@mcast1, @private1, [], [], 'geneve1\x00', 'bond0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x81fd) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000040)={&(0x7f0000000000), 0x6, &(0x7f0000000140)={&(0x7f0000002180)=ANY=[], 0x48}}, 0x0) executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000080)=0x13) r1 = syz_io_uring_setup(0x231, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r1, 0x7a98, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000006c0)=0x1a) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@x, {0x2, 0x0, 0x3, 0xa, 0x0}, {0x5}, {0x6, 0x0, 0x2}, {}, {}, {0x85, 0x0, 0x0, 0x11}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1b) executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x8001) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000040)=0xfffffffffffffc6f) r4 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000040)=0x8) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x4, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde\x04\x00\x00\x00\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xbc\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xff\xe9\x7f\xa4.\xaa!\xd6\x02\xe4\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00gO\x8b3\x97\xbd', 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) writev(r2, &(0x7f00000006c0)=[{0x0}], 0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) fallocate(r2, 0x0, 0x0, 0x8000047) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00001c6000/0x14000)=nil, &(0x7f00008ad000/0x4000)=nil, 0x0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x18, 0x8}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3f}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x8f, &(0x7f0000000000)=""/143}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600), 0x4) pipe2(0x0, 0x90800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0x0, 0xee00}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000018c0)={'syztnl1\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x7ff, 0x3, {{0x19, 0x4, 0x0, 0x0, 0x64, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@generic={0x83, 0xa, "de0ec9e213840c11"}, @timestamp_addr={0x44, 0x44, 0x94, 0x1, 0x0, [{@private=0xa010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@private=0xa010102, 0x5}, {@multicast2, 0x7ff}, {@multicast2, 0x752}, {@multicast2, 0x2}, {@local, 0xb87}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) recvmmsg(r7, &(0x7f0000005ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x2004091) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x4, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde\x04\x00\x00\x00\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xbc\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xff\xe9\x7f\xa4.\xaa!\xd6\x02\xe4\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00gO\x8b3\x97\xbd', 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) writev(r2, &(0x7f00000006c0)=[{0x0}], 0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) fallocate(r2, 0x0, 0x0, 0x8000047) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00001c6000/0x14000)=nil, &(0x7f00008ad000/0x4000)=nil, 0x0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x18, 0x8}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3f}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x8f, &(0x7f0000000000)=""/143}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600), 0x4) pipe2(0x0, 0x90800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0x0, 0xee00}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000018c0)={'syztnl1\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x7ff, 0x3, {{0x19, 0x4, 0x0, 0x0, 0x64, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@generic={0x83, 0xa, "de0ec9e213840c11"}, @timestamp_addr={0x44, 0x44, 0x94, 0x1, 0x0, [{@private=0xa010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@private=0xa010102, 0x5}, {@multicast2, 0x7ff}, {@multicast2, 0x752}, {@multicast2, 0x2}, {@local, 0xb87}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) recvmmsg(r7, &(0x7f0000005ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x2004091) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x4, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde\x04\x00\x00\x00\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xbc\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xff\xe9\x7f\xa4.\xaa!\xd6\x02\xe4\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00gO\x8b3\x97\xbd', 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) writev(r2, &(0x7f00000006c0)=[{0x0}], 0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) fallocate(r2, 0x0, 0x0, 0x8000047) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00001c6000/0x14000)=nil, &(0x7f00008ad000/0x4000)=nil, 0x0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x18, 0x8}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3f}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x8f, &(0x7f0000000000)=""/143}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600), 0x4) pipe2(0x0, 0x90800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0x0, 0xee00}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000018c0)={'syztnl1\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x7ff, 0x3, {{0x19, 0x4, 0x0, 0x0, 0x64, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@generic={0x83, 0xa, "de0ec9e213840c11"}, @timestamp_addr={0x44, 0x44, 0x94, 0x1, 0x0, [{@private=0xa010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@private=0xa010102, 0x5}, {@multicast2, 0x7ff}, {@multicast2, 0x752}, {@multicast2, 0x2}, {@local, 0xb87}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) recvmmsg(r7, &(0x7f0000005ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x2004091) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000240)={0x10}, 0x10}], 0x1}, 0x0) bind$netlink(r0, &(0x7f0000001b40)={0x10, 0x0, 0x0, 0x100000}, 0xc) executing program 0: syz_io_uring_setup(0x24fa, &(0x7f0000000280)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x6129, &(0x7f0000000600)={0x0, 0x0, 0x10100}, &(0x7f00000005c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x202}, &(0x7f00000002c0)='./bus\x00', 0x18}) io_uring_enter(r2, 0x291c, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}) socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) ftruncate(r6, 0x4) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2713, 0x0, &(0x7f00000000c0)) [ 346.082507][T18733] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 346.094594][T18735] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 346.117405][T18737] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 346.122204][T18682] chnl_net:caif_netlink_parms(): no params data found executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'hsr0\x00', &(0x7f0000000000)=@ethtool_rxnfc={0x1f, 0x0, 0x0, {0x0, @tcp_ip6_spec={@loopback, @ipv4={'\x00', '\xff\xff', @private}}, {0x0, @multicast}, @usr_ip6_spec={@empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x0, @local}}}}) executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0xffffffffffffffff}) [ 346.202129][T18682] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.210123][T18682] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.218147][T18682] bridge_slave_0: entered allmulticast mode [ 346.224830][T18682] bridge_slave_0: entered promiscuous mode [ 346.232230][T18682] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.239459][T18682] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto$inet6(r1, &(0x7f00000001c0)="9186", 0x2, 0x0, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000b00)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x400}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00'}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x54}}, 0x0) [ 346.248330][T18682] bridge_slave_1: entered allmulticast mode [ 346.255433][T18682] bridge_slave_1: entered promiscuous mode [ 346.273305][T18682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.283918][T18682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@x, {0x2, 0x0, 0x3, 0xa, 0x0}, {0x5}, {0x6, 0x0, 0x2}, {}, {}, {0x85, 0x0, 0x0, 0x11}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1b) executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000d00), 0x4) sendto$inet(r0, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) [ 346.314531][T18682] team0: Port device team_slave_0 added [ 346.322353][T18682] team0: Port device team_slave_1 added executing program 0: syz_io_uring_setup(0x24fa, &(0x7f0000000280)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x6129, &(0x7f0000000600)={0x0, 0x0, 0x10100}, &(0x7f00000005c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x202}, &(0x7f00000002c0)='./bus\x00', 0x18}) io_uring_enter(r2, 0x291c, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}) socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) ftruncate(r6, 0x4) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2713, 0x0, &(0x7f00000000c0)) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[], 0x8) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}, 0x18) [ 346.358570][T18682] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 346.365703][T18682] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 346.392295][T18682] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x4, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde\x04\x00\x00\x00\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xbc\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xff\xe9\x7f\xa4.\xaa!\xd6\x02\xe4\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00gO\x8b3\x97\xbd', 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) writev(r2, &(0x7f00000006c0)=[{0x0}], 0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) fallocate(r2, 0x0, 0x0, 0x8000047) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00001c6000/0x14000)=nil, &(0x7f00008ad000/0x4000)=nil, 0x0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x18, 0x8}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3f}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x8f, &(0x7f0000000000)=""/143}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600), 0x4) pipe2(0x0, 0x90800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0x0, 0xee00}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000018c0)={'syztnl1\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x7ff, 0x3, {{0x19, 0x4, 0x0, 0x0, 0x64, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@generic={0x83, 0xa, "de0ec9e213840c11"}, @timestamp_addr={0x44, 0x44, 0x94, 0x1, 0x0, [{@private=0xa010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@private=0xa010102, 0x5}, {@multicast2, 0x7ff}, {@multicast2, 0x752}, {@multicast2, 0x2}, {@local, 0xb87}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) recvmmsg(r7, &(0x7f0000005ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x2004091) [ 346.404207][T18682] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 346.411271][T18682] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 346.437305][T18682] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x20, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000079120f000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x4, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde\x04\x00\x00\x00\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xbc\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xff\xe9\x7f\xa4.\xaa!\xd6\x02\xe4\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00gO\x8b3\x97\xbd', 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) writev(r2, &(0x7f00000006c0)=[{0x0}], 0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) fallocate(r2, 0x0, 0x0, 0x8000047) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00001c6000/0x14000)=nil, &(0x7f00008ad000/0x4000)=nil, 0x0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x18, 0x8}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3f}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x8f, &(0x7f0000000000)=""/143}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600), 0x4) pipe2(0x0, 0x90800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0x0, 0xee00}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000018c0)={'syztnl1\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x7ff, 0x3, {{0x19, 0x4, 0x0, 0x0, 0x64, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@generic={0x83, 0xa, "de0ec9e213840c11"}, @timestamp_addr={0x44, 0x44, 0x94, 0x1, 0x0, [{@private=0xa010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@private=0xa010102, 0x5}, {@multicast2, 0x7ff}, {@multicast2, 0x752}, {@multicast2, 0x2}, {@local, 0xb87}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) recvmmsg(r7, &(0x7f0000005ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x2004091) executing program 0: unshare(0x2000680) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, 0x0, 0x0) [ 346.498272][T18682] hsr_slave_0: entered promiscuous mode [ 346.507392][T18682] hsr_slave_1: entered promiscuous mode [ 346.516664][T18682] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 346.523607][T18763] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 346.525071][T18682] Cannot create hsr debugfs directory executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000280)) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x2, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) [ 346.551711][T18768] netlink: 'syz-executor.1': attribute type 1 has an invalid length. executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x9, 0x40, 0x1f, 0x8, 0x6, 0xffffffffffffffff, 0xffffffff}, 0x48) executing program 0: syz_io_uring_setup(0x24fa, &(0x7f0000000280)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x6129, &(0x7f0000000600)={0x0, 0x0, 0x10100}, &(0x7f00000005c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x202}, &(0x7f00000002c0)='./bus\x00', 0x18}) io_uring_enter(r2, 0x291c, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}) socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) ftruncate(r6, 0x4) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2713, 0x0, &(0x7f00000000c0)) [ 346.611955][T18682] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xf, &(0x7f0000000580)=@ringbuf, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r1, 0x0) bpf$BPF_PROG_QUERY(0x1e, &(0x7f0000000380)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@RTM_DELMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x20, 0x1, {r2, 0x0, 0x0, 0x0, {@in6_addr=@private1, 0x86dd}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x18, 0x76, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6}}, 0x18}, 0x1, 0x5502000000000000}, 0x0) sendmsg$nl_route(r0, 0x0, 0x8000) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, 0x0, 0x8, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)=@newlink={0x44, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @remote}]}}}]}, 0x44}}, 0x0) [ 346.678190][T18682] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x810b}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @dev, @void, {@ipv4={0x800, @icmp={{0xd, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @empty=0xac1414aa, @remote}}}}}}, 0x0) executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000340)={&(0x7f0000000780), 0x0}) r2 = dup3(r0, r1, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000d80)={&(0x7f0000000000), &(0x7f0000002e40)=""/4109, 0x100d}) [ 346.720318][T18682] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: add_key(&(0x7f0000000100)='big_key\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0, 0x0) executing program 1: syz_mount_image$iso9660(0xfffffffffffffffe, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4480, &(0x7f00000001c0)=ANY=[@ANYRESOCT], 0x0, 0x6a4, &(0x7f0000000dc0)="$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") executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x4, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde\x04\x00\x00\x00\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xbc\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xff\xe9\x7f\xa4.\xaa!\xd6\x02\xe4\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00gO\x8b3\x97\xbd', 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) writev(r2, &(0x7f00000006c0)=[{0x0}], 0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) fallocate(r2, 0x0, 0x0, 0x8000047) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00001c6000/0x14000)=nil, &(0x7f00008ad000/0x4000)=nil, 0x0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x18, 0x8}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3f}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x8f, &(0x7f0000000000)=""/143}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600), 0x4) pipe2(0x0, 0x90800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0x0, 0xee00}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000018c0)={'syztnl1\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x7ff, 0x3, {{0x19, 0x4, 0x0, 0x0, 0x64, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@generic={0x83, 0xa, "de0ec9e213840c11"}, @timestamp_addr={0x44, 0x44, 0x94, 0x1, 0x0, [{@private=0xa010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@private=0xa010102, 0x5}, {@multicast2, 0x7ff}, {@multicast2, 0x752}, {@multicast2, 0x2}, {@local, 0xb87}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}]}}}}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) recvmmsg(r7, &(0x7f0000005ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x2004091) [ 346.779747][T18682] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x3) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, &(0x7f0000000180)) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f000000b6c0)={0x18, 0x33, 0x301, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0) [ 346.822965][T18797] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 346.823143][T18796] loop1: detected capacity change from 0 to 164 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xf, &(0x7f0000000580)=@ringbuf, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r1, 0x0) bpf$BPF_PROG_QUERY(0x1e, &(0x7f0000000380)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 346.873221][T18682] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 346.882114][T18682] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 346.892601][T18682] netdevsim netdevsim3 netdevsim2: renamed from eth2 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x810b}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @dev, @void, {@ipv4={0x800, @icmp={{0xd, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @empty=0xac1414aa, @remote}}}}}}, 0x0) executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pimreg0\x00', 0x212}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\a']) [ 346.918102][T18682] netdevsim netdevsim3 netdevsim3: renamed from eth3 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80080400) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xbe, &(0x7f0000000080), &(0x7f00000000c0)=0x4) executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000080)=0x13) r1 = syz_io_uring_setup(0x231, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r1, 0x7a98, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000006c0)=0x1a) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x38, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) [ 346.993097][T18682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.006661][T18682] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.023027][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.030231][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000008c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r0, &(0x7f00000000c0)="3f05fe7fe6e8120006001e0089e9aaa921d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0x11, 0x8847, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) executing program 0: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), 0x4) executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x5c}, {0x6}]}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local={0x3}, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x14}}}}}, 0x0) [ 347.046032][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.053300][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.075229][T18682] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 347.085718][T18682] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'hsr0\x00', &(0x7f0000000000)=@ethtool_rxnfc={0x1f, 0x0, 0x0, {0x0, @tcp_ip6_spec={@loopback, @ipv4={'\x00', '\xff\xff', @private}}, {0x0, @multicast}, @usr_ip6_spec={@empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x0, @local}}}}) [ 347.183910][T18682] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 347.253926][T18682] veth0_vlan: entered promiscuous mode [ 347.263517][T18682] veth1_vlan: entered promiscuous mode [ 347.284386][T18682] veth0_macvtap: entered promiscuous mode [ 347.292979][T18682] veth1_macvtap: entered promiscuous mode [ 347.306425][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.316985][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.326845][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.337435][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 2: mkdir(&(0x7f0000003200)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x0) pread64(r0, &(0x7f0000003280)=""/4076, 0xfec, 0x0) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}}, 0x0) executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004cc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000005c0)={0x2000a210}) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) quotactl_fd$Q_SETINFO(r1, 0x0, 0x0, 0x0) [ 347.347349][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.357780][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.367643][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.378091][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.388085][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.398773][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.408614][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.419116][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.428949][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.439393][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@RTM_DELMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x20, 0x1, {r2, 0x0, 0x0, 0x0, {@in6_addr=@private1, 0x86dd}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x18, 0x76, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6}}, 0x18}, 0x1, 0x5502000000000000}, 0x0) sendmsg$nl_route(r0, 0x0, 0x8000) [ 347.449267][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.459697][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.469537][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 347.480083][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.489894][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r1 = epoll_create1(0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40088a01, &(0x7f0000000e80)=0x100) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x5c}, {0x6}]}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local={0x3}, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x14}}}}}, 0x0) [ 347.500372][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.512723][T18682] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 347.521577][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.532038][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.541924][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.552382][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.562232][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.572933][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.572952][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.593260][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.603075][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.613485][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.623312][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.633874][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.643681][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.654118][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.664021][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.674562][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.684406][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.694829][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x2, &(0x7f00000004c0)={&(0x7f0000002080)=""/4096, 0x1000}) [ 347.704724][T18682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 347.715131][T18682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.726842][T18682] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000000)=0xe, 0x4) executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x18, {"a2e3ad21ed6b52f99cfbf4c087f74f9b36096eff7fc6e5539b9b18098b9b4a1b2552091b080d29428f0e1ac6e7049b3468959b189a242a9b60f3988f7ef319520100ffe8d178708c523c921b1b25380a169b63d336cd3b78130daa61d8e81aea882f5802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f309f4cff7738596ecae8707ce065cd5b91cd0ae193973735b36d5b1b63e91c00300300000000000000b1dda98e2d749be7bd1d020000000000000075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecd03aded6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801000000005b6bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27afc953854a642c57519544ae15a7e454dea05918b412435111c8f11baa500a3621c56cea8d20ff911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269caf12c31357c8219793e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a687974e7b4ab01b7f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a60560a22f1fca567e65d5e880572286522449df466c632b3570243f989cce3803f465e41e610c20d80421d653a5120000008213b704c7fb082ff27590678ef9f190bae979babc7041d860420c5664ba7921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da3710ac000000001a527777a5371f87d0d4aa202fd28f28381aab144a5d429a04a689b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2f05dd3318271a1f5f8528f227e79c1388dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eefc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f103000000416d59fdee5325928974d12dad99dac44c3f0008047096a44060bebc2420aed92fa9b6578b4779415d97b9a6d601005c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac292d9e53803ed000000009737d214060005ea6f1783e287b3bee96e3a7288afe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f48fe4eae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df34959eaef6572e1e007fa55a2999f596d0673f586749b25f5a448427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf02b98a269b891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efedfd71af9444e197f47e866101496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441984cb51682a8ae4d24ad0465f3927f889b09114edb8e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615f7084a607a7eceb6243378e0610060f02cca4051c2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c4e15a7b6eb65ca8104e1b4da1fbb67ab2fc043aead87c32ab875ee7c2e7b7019c902cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe529003d1802d5676d95f160ec97b1ad948741b2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd73643de50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c1023bf70cc77737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f236c6b9990ae71806f2c00b4025c48b75c0f73c497579773767075428067e7f16f4dde374f8211fef42cb468e623daf60b3569d462f4f19eacdb3ed70eeebb4483f070077d443e8b40426db6fe29068c0ca3d3414442e863a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae44369ddb4581c55925d0f6f1ba471eba281f259152f85e654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b405177548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6cf1d0ab378dd4dd84e935e00785ec27e923911fab964c271556527697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9ddbfb96d6144345f48843dd014e5c5ad8fe995754bd9cf32fce1e7027132f2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afae5336651b1b9bd522d60399473296b831dbd933d93994ba30b4279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee29165895ac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463181f4b87c10772d2b13f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76d57227edff2de20a4b8e3737fbb42913777c06376f799ecb767d6f84fad6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b30f0b932a4d02da711b757fe43c06d21e759595e4e98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d0000010000000000fcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a10010549820a73c8839475f732ae00398e4bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cb0b3e35cb80dd349e891aef595dc4d080e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c60edddab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec014508e5247d33ae6c962d35603ff8454c16f8342856935125102bb784ed704887071f3d998efdd9923c954ab6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6ff7ffb1d62458d0741a12830052fcc460db043afe525629b40d7cee65802cb5e930ed624806c43a006dc9336d07c2b8081c188d26558f48261f7897084c2a1a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da3932ba5c04c24a560ad80a3ce654578376e599aff3565b1d531f30912b99e6619ebe93cc0b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c0ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e6491953264c7b34252600c9654e502dcea39cb0800eb69992e234b4ca7db2f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc640df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c6000204b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b01faffd0a5dbed2881a9700af561ac8c7e36bb2fc4c40e9cf96f06817fb903729a7db6ff9576abc9ede7885d94ff1aa7082ead01a9b03c37b0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058093fef86faec216eb6992162f8dcbf6c9c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000", 0x28d}}, 0x1006) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x21, 0x0, &(0x7f0000000100)) executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) quotactl_fd$Q_SETINFO(r1, 0x0, 0x0, 0x0) [ 347.751083][T18682] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.760843][T18682] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.769663][T18682] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.778451][T18682] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100), 0xc, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xdc, 0x0, &(0x7f0000000080)) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)={0x4c, 0x2, 0x6, 0x401, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) [ 347.808173][T18858] pimreg: left allmulticast mode executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x71, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}}, 0x0) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x62, 0xa}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x3, &(0x7f000000cf3d)=""/195}, 0x32) executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x11, 0x0, &(0x7f0000000080)) executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pimreg0\x00', 0x212}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\a']) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x21, 0x0, &(0x7f0000000100)) executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) quotactl_fd$Q_SETINFO(r1, 0x0, 0x0, 0x0) executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000080)=0x13) r1 = syz_io_uring_setup(0x231, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r1, 0x7a98, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000006c0)=0x1a) executing program 3: iopl(0x3) prctl$PR_SET_NAME(0x22, &(0x7f0000000040)) [ 347.909759][T18870] hub 3-0:1.0: USB hub found [ 347.924500][T18870] hub 3-0:1.0: 8 ports detected executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000000)=0xe, 0x4) executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e5ef007b000000d0000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0x53}, {&(0x7f0000000fc0)=""/4096, 0x5c8}, {&(0x7f0000000400)=""/106, 0x9d8}, {&(0x7f0000000740)=""/73, 0x60}, {&(0x7f0000000200)=""/77, 0xb8}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x158}], 0x8, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x21, 0x0, &(0x7f0000000100)) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6c}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1c}, 0x90) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}}, 0x0) [ 348.000505][T18890] pimreg: entered allmulticast mode executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x2, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) quotactl_fd$Q_SETINFO(r1, 0x0, 0x0, 0x0) executing program 1: syz_io_uring_setup(0x24fa, &(0x7f0000000280)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x6129, &(0x7f0000000600)={0x0, 0x0, 0x10100}, &(0x7f00000005c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x202}, &(0x7f00000002c0)='./bus\x00', 0x18}) io_uring_enter(r2, 0x291c, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}) socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) ftruncate(r6, 0x4) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2713, 0x0, &(0x7f00000000c0)) [ 348.021407][T18890] pimreg: left allmulticast mode executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x71, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023621}) executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x34) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000280)='3', 0x1}], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x8000)=nil, 0x8000, 0x0, 0x12, r2, 0x0) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}}, 0x0) executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$sock(r0, &(0x7f000000fd40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000007480)="60ca1874ec34", 0x6}, {&(0x7f0000000640)="364f4f5e5e9ad0e1", 0x8}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f000000f780)=[@mark={{0x14, 0x1, 0x41}}], 0x18}}], 0x2, 0x0) executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e5ef007b000000d0000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0x53}, {&(0x7f0000000fc0)=""/4096, 0x5c8}, {&(0x7f0000000400)=""/106, 0x9d8}, {&(0x7f0000000740)=""/73, 0x60}, {&(0x7f0000000200)=""/77, 0xb8}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x158}], 0x8, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6c}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1c}, 0x90) executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)=0x2) executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x2004010, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0], 0x1, 0x99d, &(0x7f0000001240)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x15180) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000000)=0xe, 0x4) [ 348.111611][T18906] hub 3-0:1.0: USB hub found [ 348.120588][T18906] hub 3-0:1.0: 8 ports detected executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000800000000000000100000094"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x60, 0x2, {{0x2, [], 0x0, [0x4, 0x2], [0x0, 0x4]}, [@TCA_MQPRIO_SHAPER={0x6}]}}}]}, 0x90}}, 0x0) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x2c}}, 0x0) executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={[{@none}, {@subsystem='net_cls'}]}) executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) shutdown(r0, 0x0) shutdown(r0, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000003a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2c000011) executing program 3: r0 = socket(0x18, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004cc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000005c0)={0x2000a210}) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000006cd1abb600000004000000550000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6c}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1c}, 0x90) [ 348.198302][T18924] pimreg: entered allmulticast mode [ 348.216090][T18924] pimreg: left allmulticast mode [ 348.221340][T18924] dvmrp1: left allmulticast mode [ 348.232094][T18930] cgroup: none used incorrectly executing program 4: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), 0x4) executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) shutdown(r0, 0x0) shutdown(r0, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000003a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2c000011) executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000000)=0xe, 0x4) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f000000b6c0)={0x18, 0x33, 0x301, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0) executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x2c}}, 0x0) executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000a1401"], 0xd8}}, 0x0) executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) executing program 3: mkdir(&(0x7f0000003200)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x0) pread64(r0, &(0x7f0000003280)=""/4076, 0xfec, 0x0) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000000)=0xe, 0x4) [ 348.343710][T18948] pimreg: entered allmulticast mode [ 348.348303][T18951] netlink: 200 bytes leftover after parsing attributes in process `syz-executor.4'. [ 348.384179][ T7902] bridge_slave_1: left allmulticast mode [ 348.390005][ T7902] bridge_slave_1: left promiscuous mode [ 348.395696][ T7902] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.416403][ T7902] bridge_slave_0: left allmulticast mode [ 348.422153][ T7902] bridge_slave_0: left promiscuous mode executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) syz_io_uring_setup(0x6b93, 0x0, &(0x7f0000000280)=0x0, &(0x7f0000000480)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000004c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0xa, 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r2}}) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0xb3d, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e24, 0x4, @mcast2, 0x401}}, 0x0, 0x0, 0x26, 0x0, "feb58b0c9d86813ba29501d35d8bc4e252b475413088fb31ecca3d6e6bae0c06aaa9aebea832aae9ee3728331f8472b27ed6501314803df17631514ee6f64cbcbc5fe7529aaa85edf6c7100f50763d00"}, 0xd8) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)={0x1c}, 0xffffff14}}, 0x0) getsockname$packet(r7, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507040000000000000000000010", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340), 0x38}}, 0x0) r9 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=@newlink={0x48, 0x29, 0x10f, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0xffffffff}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}]}, 0x48}}, 0x0) executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)) r1 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) close_range(r0, 0xffffffffffffffff, 0x0) [ 348.428157][ T7902] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.469256][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 348.469268][ T28] audit: type=1326 audit(2000000642.607:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18964 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f074ce57ea9 code=0x0 [ 348.578810][ T7902] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 348.598334][ T7902] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 348.610425][ T7902] bond0 (unregistering): Released all slaves [ 348.622806][ T7902] bond1 (unregistering): Released all slaves [ 348.635652][ T7902] bond2 (unregistering): Released all slaves [ 348.644114][T18948] pimreg: left allmulticast mode [ 348.660839][T18966] pimreg: entered allmulticast mode [ 348.667273][T18970] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 348.676635][T18973] pimreg: left allmulticast mode executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) shutdown(r0, 0x0) shutdown(r0, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000003a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2c000011) executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) shutdown(r0, 0x414247e4f7261916) [ 348.683174][ T28] audit: type=1400 audit(2000000642.817:1162): avc: denied { write } for pid=18953 comm="syz-executor.0" path="socket:[64780]" dev="sockfs" ino=64780 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 executing program 1: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000240)='./file1\x00', 0x328a81d, 0x0, 0x0, 0x0, &(0x7f0000000480)) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000580), 0x24, 0x0) setresuid(0x0, 0xee00, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x258, 0x268, 0x311, 0x258, 0x268, 0x390, 0x460, 0x460, 0x390, 0x460, 0x9, 0x0, {[{{@uncond, 0x160, 0xa8, 0xd0, 0x0, {0x9401}}, @common=@unspec=@NFQUEUE2={0x28}}, {{@uncond, 0x0, 0xd0, 0x138, 0xe4030000, {}, [@common=@ipv6header={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) msgget$private(0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0xa9dd07f7027f0000, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x8, 0x0) [ 348.748423][ T28] audit: type=1400 audit(2000000642.887:1163): avc: denied { shutdown } for pid=18979 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 348.787763][ T7902] hsr_slave_0: left promiscuous mode [ 348.793594][ T7902] hsr_slave_1: left promiscuous mode executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001400)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="adba3834b648", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 348.800049][ T7902] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 348.807626][ T7902] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 348.816001][ T7902] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 348.823481][ T7902] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 348.834052][ T7902] veth1_macvtap: left promiscuous mode [ 348.839717][ T7902] veth0_macvtap: left promiscuous mode executing program 1: setregid(0xffffffffffffffff, 0x0) creat(&(0x7f0000001180)='./file0\x00', 0x21) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r0) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7ffffffff000, 0x3, &(0x7f0000ffd000/0x3000)=nil) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_bond\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x4c}}, 0x0) [ 348.845493][ T7902] veth1_vlan: left promiscuous mode [ 348.850718][ T7902] veth0_vlan: left promiscuous mode executing program 3: ioprio_set$pid(0x0, 0x0, 0x2004) executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x541c, 0x4000000000001) executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x2, &(0x7f00000004c0)={&(0x7f0000002080)=""/4096, 0x1000}) executing program 3: r0 = socket(0x18, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004cc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000005c0)={0x2000a210}) executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x34) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000280)='3', 0x1}], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x8000)=nil, 0x8000, 0x0, 0x12, r2, 0x0) [ 348.957091][ T7902] team0 (unregistering): Port device team_slave_1 removed [ 348.968943][ T7902] team0 (unregistering): Port device team_slave_0 removed executing program 2: symlinkat(0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') r0 = socket$packet(0x11, 0x2, 0x300) unshare(0x22020400) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x7f, &(0x7f0000000040)="000300000d80ffff", 0x8) executing program 2: ioprio_set$pid(0x0, 0x0, 0x2004) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="ffffffff", 0x4}], 0x1}}], 0x1, 0x0) executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x2, &(0x7f00000004c0)={&(0x7f0000002080)=""/4096, 0x1000}) executing program 3: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000003700)='ns/mnt\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=@updsa={0x104, 0x16, 0x1, 0x0, 0x0, {{@in6=@private1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@loopback, 0x0, 0x6c}, @in=@dev}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x104}}, 0x0) getpgrp(0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x25) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000003740)) fsmount(0xffffffffffffffff, 0x64ba1f0ca29ea87f, 0x74) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0x5, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, @vifc_lcl_addr=@empty, @remote}, 0x10) setsockopt$MRT_INIT(r1, 0x0, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') write$cgroup_int(r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) setpriority(0x0, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x2, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)) executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000003700)='ns/mnt\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=@updsa={0x104, 0x16, 0x1, 0x0, 0x0, {{@in6=@private1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@loopback, 0x0, 0x6c}, @in=@dev}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x104}}, 0x0) getpgrp(0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x25) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000003740)) fsmount(0xffffffffffffffff, 0x64ba1f0ca29ea87f, 0x74) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0x5, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, @vifc_lcl_addr=@empty, @remote}, 0x10) setsockopt$MRT_INIT(r1, 0x0, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') write$cgroup_int(r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) setpriority(0x0, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x2, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)) executing program 2: symlinkat(0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') r0 = socket$packet(0x11, 0x2, 0x300) unshare(0x22020400) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_bond\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x4c}}, 0x0) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x300, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8}, @NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_DREG={0x8}, @NFTA_BITWISE_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x298, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @byteorder={{0xe}, @void}}, {0x260, 0x1, 0x0, 0x1, @cmp={{0x8}, @val={0x254, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG={0x8}, @NFTA_CMP_SREG={0x8}, @NFTA_CMP_OP={0x8}, @NFTA_CMP_OP={0x8}, @NFTA_CMP_OP={0x8}, @NFTA_CMP_DATA={0x228, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xd9, 0x1, "7bf69d22c9a09d47d8a482d00f959a21abe466ef4c438807593b1d526e31e1146f793332b1822202d006abfe0404a4c9034f22cfd19fd2d029566eeead540dbca136ceef5f305212d3f9ced589ea91f6363311e4222e54a41df8835a70593e16151b5f416bd0c70da48787ed1af8372f4ceef85f486652524c86dc1050316176ff4a42ce2dc75191206c7868e9a59abf8841d6a356241801d096c6f633e6f9b676155b9cb257065c0a85cd0ab305763b08ba96a17fdec8ff696451eeec41fb5665a97ba0a86452b07586b2ad948b2099347e0b1bdc"}, @NFTA_DATA_VALUE={0x87, 0x1, "8bc9bdfcfec229b903e93e2b25f7298119d215c41ae2fff687424adf69f429808ccf2e7207674a7199253332a472c719637177458fc8eee238ce5bc7d1c8c052ac4e98a9ea74abda40e943aee386d5363b588e27a76eb22442863de525dc400e2ad7d7a66d7e9968fc1341f3921f3b6b6acbe330be8917b6545ac648fd05b6ca28da92"}, @NFTA_DATA_VALUE={0x20, 0x1, "ad5bef6ac717cd150bd00463774d7035f871938ef530b664f86a090d"}, @NFTA_DATA_VALUE={0x48, 0x1, "5bafb7589b8cac5a7fecdb221d013c17597c791b4703c539dd4fefab83b7c09378b9fa0a272a272500476efe83ef67e3f3f2edf3d24ec108d3106e6239fdecc7bd10d943"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}}}, {0xffffffb4, 0x1, 0x0, 0x1, @numgen={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}]}]}], {0x14}}, 0x328}}, 0x0) [ 349.099365][T19020] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 349.118127][T19022] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) [ 349.161548][T19026] veth1_to_bond: entered promiscuous mode [ 349.170960][T19028] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 349.180392][T19026] veth1_to_bond: left promiscuous mode executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000003700)='ns/mnt\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=@updsa={0x104, 0x16, 0x1, 0x0, 0x0, {{@in6=@private1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@loopback, 0x0, 0x6c}, @in=@dev}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x104}}, 0x0) getpgrp(0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x25) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000003740)) fsmount(0xffffffffffffffff, 0x64ba1f0ca29ea87f, 0x74) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0x5, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, @vifc_lcl_addr=@empty, @remote}, 0x10) setsockopt$MRT_INIT(r1, 0x0, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') write$cgroup_int(r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) setpriority(0x0, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x2, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)) executing program 1: ioprio_set$pid(0x0, 0x0, 0x2004) executing program 1: mkdir(&(0x7f0000003200)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x0) pread64(r0, &(0x7f0000003280)=""/4076, 0xfec, 0x0) executing program 2: symlinkat(0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') r0 = socket$packet(0x11, 0x2, 0x300) unshare(0x22020400) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="ffffffff", 0x4}], 0x1}}], 0x1, 0x0) executing program 2: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000202be04020506056403040c5c0009003f0020010a0000000d0085a168d0bf46d32345653600648d270015000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000402160008000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0xa00000000000000) executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)={0x4c, 0x2, 0x6, 0x401, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) executing program 2: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)=0x2) [ 349.346995][T19041] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)) r1 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) close_range(r0, 0xffffffffffffffff, 0x0) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)={0x4c, 0x2, 0x6, 0x401, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) [ 349.433535][T19047] loop4: detected capacity change from 0 to 2048 [ 349.451889][ T28] audit: type=1326 audit(2000000643.587:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19051 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f390f679ea9 code=0x0 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="ffffffff", 0x4}], 0x1}}], 0x1, 0x0) [ 349.500909][T19052] loop2: detected capacity change from 0 to 2048 [ 349.518675][T19047] EXT4-fs error (device loop4): __ext4_fill_super:5468: inode #2: comm syz-executor.4: casefold flag without casefold feature executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100), 0xc, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xdc, 0x0, &(0x7f0000000080)) [ 349.562265][T19047] EXT4-fs (loop4): get root inode failed [ 349.568015][T19047] EXT4-fs (loop4): mount failed [ 349.582281][T19052] EXT4-fs error (device loop2): __ext4_fill_super:5468: inode #2: comm syz-executor.2: casefold flag without casefold feature [ 349.606655][T19052] EXT4-fs (loop2): get root inode failed [ 349.612352][T19052] EXT4-fs (loop2): mount failed executing program 0: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000202be04020506056403040c5c0009003f0020010a0000000d0085a168d0bf46d32345653600648d270015000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000402160008000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0xa00000000000000) executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000003700)='ns/mnt\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=@updsa={0x104, 0x16, 0x1, 0x0, 0x0, {{@in6=@private1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@loopback, 0x0, 0x6c}, @in=@dev}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x104}}, 0x0) getpgrp(0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x25) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000003740)) fsmount(0xffffffffffffffff, 0x64ba1f0ca29ea87f, 0x74) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0x5, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, @vifc_lcl_addr=@empty, @remote}, 0x10) setsockopt$MRT_INIT(r1, 0x0, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') write$cgroup_int(r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) setpriority(0x0, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x2, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)) [ 349.742480][T19069] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x5c}, {0x6}]}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local={0x3}, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x14}}}}}, 0x0) executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) syz_io_uring_setup(0x6b93, 0x0, &(0x7f0000000280)=0x0, &(0x7f0000000480)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000004c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0xa, 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r2}}) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0xb3d, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e24, 0x4, @mcast2, 0x401}}, 0x0, 0x0, 0x26, 0x0, "feb58b0c9d86813ba29501d35d8bc4e252b475413088fb31ecca3d6e6bae0c06aaa9aebea832aae9ee3728331f8472b27ed6501314803df17631514ee6f64cbcbc5fe7529aaa85edf6c7100f50763d00"}, 0xd8) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)={0x1c}, 0xffffff14}}, 0x0) getsockname$packet(r7, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507040000000000000000000010", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340), 0x38}}, 0x0) r9 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=@newlink={0x48, 0x29, 0x10f, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0xffffffff}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}]}, 0x48}}, 0x0) [ 349.887748][T19076] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 0: setregid(0xffffffffffffffff, 0x0) creat(&(0x7f0000001180)='./file0\x00', 0x21) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r0) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7ffffffff000, 0x3, &(0x7f0000ffd000/0x3000)=nil) executing program 0: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x258, 0x268, 0x311, 0x258, 0x268, 0x390, 0x460, 0x460, 0x390, 0x460, 0x9, 0x0, {[{{@uncond, 0x160, 0xa8, 0xd0, 0x0, {0x9401}}, @common=@unspec=@NFQUEUE2={0x28}}, {{@uncond, 0x0, 0xd0, 0x138, 0xe4030000, {}, [@common=@ipv6header={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) msgget$private(0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0xa9dd07f7027f0000, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x8, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x5, 0xc, 0x7, 0x5}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000480)=""/146}, 0x1d) executing program 0: epoll_create1(0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x3d17, 0x0, 0x0, 0x0, 0x0, "dadd1000b1df022dace17a32d21100"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [{@seclabel}, {@appraise_type}, {@uid_eq}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x1, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x7b}], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex}, 0x10) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000080)={@broadcast, @empty, 0x0, "d64724f6257e43b341dc333940c0ca00"}, 0x3c) executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x541c, 0x4000000000001) executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @empty}], 0x10) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x7, 0x0, &(0x7f0000000040)) [ 350.316845][T19087] pimreg: entered allmulticast mode executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_bond\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x4c}}, 0x0) executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000003700)='ns/mnt\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=@updsa={0x104, 0x16, 0x1, 0x0, 0x0, {{@in6=@private1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@loopback, 0x0, 0x6c}, @in=@dev}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x104}}, 0x0) getpgrp(0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x25) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000003740)) fsmount(0xffffffffffffffff, 0x64ba1f0ca29ea87f, 0x74) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0x5, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, @vifc_lcl_addr=@empty, @remote}, 0x10) setsockopt$MRT_INIT(r1, 0x0, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') write$cgroup_int(r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) setpriority(0x0, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x2, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)) executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000004600)=""/102381, 0x18fed, 0xfffffffffffffffc, 0x0) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnetconf={0x14, 0x52, 0x311}, 0x14}}, 0x0) read(r1, &(0x7f0000000200)=""/4090, 0xffa) executing program 1: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005840)=[{0x10, 0x110, 0xa}, {0x10}], 0x20}, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x17) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x200000, 0x8) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newqdisc={0x6c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{}, [@TCA_NETEM_RATE={0x14}, @TCA_NETEM_RATE64={0xc}]}}}]}, 0x6c}}, 0x0) [ 350.841669][T19101] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x7f, &(0x7f0000000040)="000300000d80ffff", 0x8) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x4, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "bc3e3a45db8f3973"}}}]}, 0x2c}}, 0x0) executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnetconf={0x14, 0x52, 0x311}, 0x14}}, 0x0) read(r1, &(0x7f0000000200)=""/4090, 0xffa) executing program 1: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005840)=[{0x10, 0x110, 0xa}, {0x10}], 0x20}, 0x0) executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r2, 0x4b4a, 0x0) [ 350.889923][T19106] veth1_to_bond: entered promiscuous mode [ 350.922919][T19106] veth1_to_bond: left promiscuous mode executing program 2: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xf3e, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r0, &(0x7f00000000c0)="3f040e00f0e812002c001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c152cfdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0x11, 0x0, r1, 0x1, 0x3c, 0x6, @multicast}, 0x14) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x17) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x200000, 0x8) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)) r1 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) close_range(r0, 0xffffffffffffffff, 0x0) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x4, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "bc3e3a45db8f3973"}}}]}, 0x2c}}, 0x0) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newqdisc={0x6c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{}, [@TCA_NETEM_RATE={0x14}, @TCA_NETEM_RATE64={0xc}]}}}]}, 0x6c}}, 0x0) executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000003c0)=[{{&(0x7f0000000240)=@in6={0xa, 0x4e21, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in6={0xa, 0x4e24, 0x0, @private1}, 0x80, 0x0, 0x0, &(0x7f0000000080)=[@txtime={{0x18, 0x1, 0x41}}], 0x18}}], 0x2, 0x0) [ 351.036217][ T28] audit: type=1326 audit(2000000645.177:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19133 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7d2308dea9 code=0x0 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r1) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg$inet(r0, &(0x7f0000000740)=[{{&(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x18, 0x2000000}}, {{&(0x7f00000001c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000300)="e5c98623373a4eed7edaf7b4c6d3888ddb14734eee21b385ee7b4e67a23472d39d2e7869b031ada21f3b95113ab59a65abd7", 0x32}, {&(0x7f0000000380)}, {&(0x7f00000003c0)}], 0x4, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @rand_addr=0x64010100}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_retopts={{0x28, 0x0, 0x7, {[@ra={0x94, 0x4, 0xfffe}, @end, @end, @lsrr={0x83, 0xb, 0x5e, [@loopback, @multicast2]}, @generic={0x82, 0x5, "34965b"}, @noop]}}}], 0x80}}], 0x2, 0x850) executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x34, r1, 0x301, 0x0, 0x0, {0x13}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r2, 0x4b4a, 0x0) executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x4, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "bc3e3a45db8f3973"}}}]}, 0x2c}}, 0x0) executing program 2: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000240)='./file1\x00', 0x328a81d, 0x0, 0x0, 0x0, &(0x7f0000000480)) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000580), 0x24, 0x0) setresuid(0x0, 0xee00, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 351.169763][T19155] loop4: detected capacity change from 0 to 2048 [ 351.190522][T19155] EXT4-fs error (device loop4): __ext4_fill_super:5468: inode #2: comm syz-executor.4: casefold flag without casefold feature executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newqdisc={0x6c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{}, [@TCA_NETEM_RATE={0x14}, @TCA_NETEM_RATE64={0xc}]}}}]}, 0x6c}}, 0x0) executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioperm(0x0, 0x3ff, 0x1000) arch_prctl$ARCH_GET_XCOMP_PERM(0x1022, &(0x7f0000000040)) [ 351.227188][T19155] EXT4-fs (loop4): get root inode failed [ 351.232873][T19155] EXT4-fs (loop4): mount failed executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@mptcp=@ack={0x1e, 0x4}, @generic={0x0, 0x2}]}}}}}}}}, 0x0) [ 351.324889][T19168] loop1: detected capacity change from 0 to 2048 [ 351.352993][T19168] EXT4-fs error (device loop1): __ext4_fill_super:5468: inode #2: comm syz-executor.1: casefold flag without casefold feature executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_emit_ethernet(0x6f, &(0x7f0000000480)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x88, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x0, 0x0, 0x4d, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "d7ba0a54e1b776b2ef02455ea4b557de0c1fe48693217fd5615fb6f2943972b4f88016cba7cab4dbf3569daa8ade8a2c01f33e06e07cdaf1fe0d1e4452b5d2067d"}}}}}}, 0x0) [ 351.358226][T19175] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 351.381164][T19168] EXT4-fs (loop1): get root inode failed [ 351.386904][T19168] EXT4-fs (loop1): mount failed executing program 2: keyctl$session_to_parent(0x12) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r2, 0x4b4a, 0x0) executing program 2: mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001f40)=""/4100, 0x1a, 0x1004, 0xa}, 0x20) executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioperm(0x0, 0x3ff, 0x1000) arch_prctl$ARCH_GET_XCOMP_PERM(0x1022, &(0x7f0000000040)) executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x183442, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0xc4030a4) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000002c0)) write$ppp(r0, &(0x7f00000003c0)='\x00!', 0x100000) [ 351.664789][ T28] audit: type=1400 audit(2000000645.797:1166): avc: denied { append } for pid=19191 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_io_uring_setup(0x2ddd, &(0x7f00000006c0)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000300)=@nfc}) io_uring_enter(r1, 0x381b, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000047000000000000003e0000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000480)={@val, @val, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local, {[@timestamp_addr={0x44, 0x4}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}, 0x3a) executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @empty}], 0x10) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x7, 0x0, &(0x7f0000000040)) executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x7c}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380), 0x5bbc}}, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x69, 0x4, 0x5, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f0000000080), 0x0}, 0x20) executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'lo\x00'}]}, 0x30}}, 0x0) executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x10000) connect$inet(r0, &(0x7f0000001fc0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040), 0x4) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000047000000000000003e0000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x2, 0xb, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) executing program 4: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0xfea7) sendfile(r0, r1, &(0x7f0000000240)=0x2, 0x8001) executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "8e44c05dfd57e5b3", "591f44ef0756020a9e1d86882c0348a6", "a29f817c", "51eb071129f5da07"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x11a, 0x4, &(0x7f0000000100), 0x3c) executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffa}]}) link(0x0, 0x0) executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)) r1 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) close_range(r0, 0xffffffffffffffff, 0x0) executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x54, r2, 0x1, 0x0, 0x0, {0x3, 0x74, 0x600}, [@NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:udev_helper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}]}, 0x54}, 0x1, 0xffffffff00000003}, 0x0) executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x14, 0x0, &(0x7f0000000340)) executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x2, 0xb, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) [ 352.224641][ T28] audit: type=1326 audit(2000000646.357:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19222 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f074ce57ea9 code=0x0 executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0xfea7) sendfile(r0, r1, &(0x7f0000000240)=0x2, 0x8001) executing program 0: socket(0x80000000000000a, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000400)=0x1, 0x4) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002840)={0xff}, 0x0, 0x0) executing program 2: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x10008, &(0x7f0000000400), 0x1, 0x762, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) gettid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0xc, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x6}}}}]}, 0x38}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000f6ffffff6600000010000000c60000000000380095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0xf, &(0x7f0000001740)=@ringbuf, &(0x7f0000001940)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x40000}, 0x10}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) readahead(r4, 0x0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1}, &(0x7f0000000100), &(0x7f0000000180)=r2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000040)=0x1f6, 0x4) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r6, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000002c00)={0x3, [], 0x40, "06db9f82177b6b"}) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0x10000) sendfile(r7, r5, 0x0, 0xffefffff) [ 352.282916][T19227] loop1: detected capacity change from 0 to 2048 [ 352.301078][T19227] EXT4-fs error (device loop1): __ext4_fill_super:5468: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 352.322038][T19227] EXT4-fs (loop1): get root inode failed [ 352.327808][T19227] EXT4-fs (loop1): mount failed [ 352.349899][T19239] loop2: detected capacity change from 0 to 2048 [ 352.358752][T19239] EXT4-fs error (device loop2): __ext4_fill_super:5468: inode #2: comm syz-executor.2: casefold flag without casefold feature [ 352.374958][T19239] EXT4-fs (loop2): get root inode failed [ 352.380726][T19239] EXT4-fs (loop2): mount failed executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000000)={0x80, 0x6, 0x303, 0x0, 0x0, 0x0, 0x0}) executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x10d, 0x0, 0x0, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x2}]}, 0x20}}, 0x0) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x52e, &(0x7f0000000a80)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7, [@func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @var={0x5, 0x0, 0x0, 0x11}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x6b}, 0x20) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fusectl\x00', 0x0, &(0x7f0000000140)='&.\\\xd8\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nilfs2_collection_stage_transition\x00', r1}, 0x10) [ 352.852317][T19250] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 352.860456][T19250] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 352.871092][T19250] loop3: detected capacity change from 0 to 512 [ 352.887037][T19250] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b36, 0x0) process_vm_readv(0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/171, 0xab}], 0x1, 0x0, 0xfffffffffffffcea, 0x0) [ 352.899890][T19250] ext4 filesystem being mounted at /root/syzkaller-testdir1283969313/syzkaller.1boXbb/27/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 352.915904][T19250] EXT4-fs error (device loop3): ext4_search_dir:1548: inode #2: block 3: comm syz-executor.3: bad entry in directory: rec_len is smaller than minimal - offset=16444, inode=113, rec_len=0, size=2048 fake=0 [ 352.944538][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0xfea7) sendfile(r0, r1, &(0x7f0000000240)=0x2, 0x8001) executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffffaf00"/24, 0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "8e44c05dfd57e5b3", "591f44ef0756020a9e1d86882c0348a6", "a29f817c", "51eb071129f5da07"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x11a, 0x4, &(0x7f0000000100), 0x3c) executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000000)={0x80, 0x6, 0x303, 0x0, 0x0, 0x0, 0x0}) executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_BLKTRACETEARDOWN(r0, 0x227e, 0x1000000000000) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x52e, &(0x7f0000000a80)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7, [@func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @var={0x5, 0x0, 0x0, 0x11}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x6b}, 0x20) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fusectl\x00', 0x0, &(0x7f0000000140)='&.\\\xd8\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nilfs2_collection_stage_transition\x00', r1}, 0x10) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x69, 0x4, 0x5, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f0000000080), 0x0}, 0x20) executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x9) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000000)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c}, 0xe80}}, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffffaf00"/24, 0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) [ 353.079049][T19267] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 353.087237][T19267] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 353.098471][T19267] loop3: detected capacity change from 0 to 512 [ 353.120206][T19267] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 353.143459][T19267] ext4 filesystem being mounted at /root/syzkaller-testdir1283969313/syzkaller.1boXbb/33/file0 supports timestamps until 2038-01-19 (0x7fffffff) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "8e44c05dfd57e5b3", "591f44ef0756020a9e1d86882c0348a6", "a29f817c", "51eb071129f5da07"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x11a, 0x4, &(0x7f0000000100), 0x3c) [ 353.162122][T19267] EXT4-fs error (device loop3): ext4_search_dir:1548: inode #2: block 3: comm syz-executor.3: bad entry in directory: rec_len is smaller than minimal - offset=16444, inode=113, rec_len=0, size=2048 fake=0 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@bridge_delneigh={0x30, 0x1d, 0xc07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @multicast}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0) executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00'}, 0x10) socketpair(0x1, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0x6, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='ext4_remove_blocks\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000b40)="a2", 0xfffffd2a}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000041) close(r6) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffeeb702000008000000b703000000000000850000000e00000095b18f0b0563cd1b2ba7115509746b3af915dc661e599060be0a77a17dc421655e53bd03cd1dde63"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = getpid() r8 = syz_pidfd_open(r7, 0x0) pidfd_send_signal(r8, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x5}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='ext4_remove_blocks\x00'}, 0x10) executing program 1: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000240), 0x2, 0x51d, &(0x7f0000000500)="$eJzs3U9sI1cZAPBvJpu1d5s2W+gBUKFLKSxotXbibVdVL2xPFUKVED1y2IbEG61ix1HslCbsIXvkjkQlTnDijAQSB6Q9cUfiADcu5YBUYAVqkJBwNWM76/xxYmUTezf+/aSR38yz/b23o3lv9HkzL4CJdTUitiPiYkS8HxGz3eNJd4vbnS1736eP7i/uPLq/mES7/d4/k7w+OxZ9n8k81/3OYkR8/52IHyb7gv4porm5tbJQq1XXu4fKrfpaubm5deNefWG5ulxdrVRuzd+ae/PmG5VT6+sr9V9/cikifv+7L3/8x+1v/Thr1ky3rr8fp6nT9endOJkLEfHdswg2BlPd/lw8yYdP9CFOUxoRn4uIV/Prfzam8rO5197T9O0Rtg4AOAvt9my0Z/v3AYDzLs1zYEla6uYCZiJNS6VODu+luJzWGs3W9buNjdWlTq7sSkynd+/VqnPdXOHD39x+O7tvmM/r8vokq6/s278ZES9GxE8Ll/L90mKjtjTG+x4AmGTP7Zv//1PozP8AwDlXfFwsjLMdAMDoFMfdAABg5Mz/ADB5zP8AMHnM/wAwecz/ADB5zP8AMFG+9+672dbe6T7/eumDzY2Vxgc3lqrNlVJ9Y7G02FhfKy03Gsv5M3vqx31frdFYm389Nj4st6rNVrm5uXWn3thYbd3Jn+t9pzo9kl4BAEd58ZWHf0kiYvutS/kWfc/7P3aufvmsWwecpXTcDQDGZmrcDQDG5uBqX8CkkI+HyfX/drsdfWv3RsSD3VLfw0AH/hehj4YKk1o3FJ4+1774BPl/4Jkm/w+T62T5f/fycB7I/8PkarcTa/4DwISR4weSY+r7f/+fa/ftDPf7PwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJxLM/mWpKXuWuAzkaalUsTzEXElppO792rVuYh4ISL+XJguZPvzEWHdIAB4lqV/T7rrf12bfW1mf+3Fwn8L+WtE/Ojn7/3sw4VWa30+4mLyr93jrY+6xyvjaD8AcJzePN2bx3s+fXR/sbeNsj2fvN1ZXDSLu9PdOjUX4kL+WsxzDZf/nXT3O7L7lalTiL/9ICK+cFj/kzw3cqW78un++Fns50caP90TP83rOq/Zv8XnT6EtMGkeZuPP7cOuvzSu5q+HX//FfIR6cr3xb+fA+Jfujn9TA8a/q8PGeP0P3zlwsD3bqXsQ8aULETu9L+8bf3rxkwHxXxsy/l9f/sqrg+rav4i4Fof1P9kTq9yqr5Wbm1s37tUXlqvL1dVK5db8rbk3b75RKec56nIvU33QP966/sKg+Fn/Lw+IXzym/18fsv+//N/7P/jqEfG/+bXDz/9LR8TP5sRvDBl/4fJvi4PqsvhLA/p/3Pm/PmT8j/+2tTTkWwGAEWhubq0s1GrV9ScvFI98T3oaIYYoJBHbZxzicaHwq5+8c/ybCyNrzwkLMahq6mlp4bkpFJ6OZgxRGPfIBJy1xxf9uFsCAAAAAAAAAAAAAAAMMoo/Jxp3HwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADi/PgsAAP//0JTXgA==") rmdir(&(0x7f0000000100)='./file0\x00') executing program 3: r0 = socket(0x15, 0x5, 0x0) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0xa, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) getsockname$llc(r0, 0x0, &(0x7f0000000080)) [ 353.209721][T19273] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19273 comm=syz-executor.4 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0x14, &(0x7f0000000380), 0x0) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time={0x0, 0xfff}, {}, {}, @quote}], 0x38) readv(r1, &(0x7f00000003c0)=[{&(0x7f0000001140)=""/136, 0x57}], 0x1) executing program 4: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB='-'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$tty20(0xc, 0x4, 0x1) sendmsg$nl_generic(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002f0001bd64cbbefba2e498fb12"], 0x14}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x600000000000000, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030000140000000000000000000000030006000000000002000000e00000020000000000000000030001000000000002000000ac1414000000000000000000030005000000000002000000ac1e0001000000000000000004000400000000000000000000000000000000000000000000000000000000000400030000000000000000000000000000000000000000000000000000000000010018"], 0xa0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x80000000, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) [ 353.258469][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 353.278718][T19282] loop1: detected capacity change from 0 to 512 executing program 0: socket(0x80000000000000a, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000400)=0x1, 0x4) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002840)={0xff}, 0x0, 0x0) executing program 3: ioperm(0x0, 0x5, 0x800000800017) kexec_load(0x0, 0x8fc, &(0x7f0000001300)=[{0x0}], 0x0) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x52e, &(0x7f0000000a80)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7, [@func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @var={0x5, 0x0, 0x0, 0x11}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x6b}, 0x20) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fusectl\x00', 0x0, &(0x7f0000000140)='&.\\\xd8\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nilfs2_collection_stage_transition\x00', r1}, 0x10) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x0, 0x0, 0x200, 0x180, 0x0, 0x250, 0x2e8, 0x2e8, 0x250, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x118, 0x180, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x5000000, 0xf5f}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ipv6={@local, @empty, [], [], 'ip6_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) [ 353.312624][T19282] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 353.328331][T19282] ext4 filesystem being mounted at /root/syzkaller-testdir2336598955/syzkaller.1pnGz5/336/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 353.365111][T19282] Quota error (device loop1): do_check_range: Getting dqdh_next_free 4294967294 out of range 0-8 [ 353.369427][T19301] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 353.382143][T19282] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 353.383828][T19301] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 353.403237][T19282] EXT4-fs error (device loop1): ext4_acquire_dquot:6886: comm syz-executor.1: Failed to acquire dquot type 0 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x9) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000000)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c}, 0xe80}}, 0x0) executing program 3: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB='-'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x14, 0x0, &(0x7f0000000340)) [ 353.405607][T19303] xt_CT: You must specify a L4 protocol and not use inversions on it [ 353.429494][T19301] loop4: detected capacity change from 0 to 512 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000004c0)={0x0, 0x465f}, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4}, 0x8) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000180)='i', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000008c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="05000500000080"], 0x12) [ 353.469844][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 353.479647][T19305] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19305 comm=syz-executor.2 [ 353.497099][T19301] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$tty20(0xc, 0x4, 0x1) sendmsg$nl_generic(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002f0001bd64cbbefba2e498fb12"], 0x14}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x600000000000000, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030000140000000000000000000000030006000000000002000000e00000020000000000000000030001000000000002000000ac1414000000000000000000030005000000000002000000ac1e0001000000000000000004000400000000000000000000000000000000000000000000000000000000000400030000000000000000000000000000000000000000000000000000000000010018"], 0xa0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x80000000, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x0, 0x0, 0x200, 0x180, 0x0, 0x250, 0x2e8, 0x2e8, 0x250, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x118, 0x180, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x5000000, 0xf5f}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ipv6={@local, @empty, [], [], 'ip6_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) [ 353.511379][T19301] ext4 filesystem being mounted at /root/syzkaller-testdir4117759423/syzkaller.rxzf6n/154/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 353.528814][T19301] EXT4-fs error (device loop4): ext4_search_dir:1548: inode #2: block 3: comm syz-executor.4: bad entry in directory: rec_len is smaller than minimal - offset=16444, inode=113, rec_len=0, size=2048 fake=0 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) close(r0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2, 0x0, 0x0, 0x2}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r2, 0x40047452, 0x0) executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000040)=@bridge_getvlan={0x20, 0x72, 0x10d, 0x0, 0x0, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x2}]}, 0x20}}, 0x0) executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x183442, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0xc4030a4) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000002c0)) write$ppp(r0, &(0x7f00000003c0)='\x00!', 0x100000) executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000480)={@val, @val, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local, {[@timestamp_addr={0x44, 0x4}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}, 0x3a) executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)='%-5lx \x00'}, 0x20) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup(r0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40603d07, &(0x7f0000000040)) [ 353.567051][T17143] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000500)=[@in={0x2, 0x0, @rand_addr=0x64010100}]}, &(0x7f0000000180)=0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0), 0x6db6e559) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f0000000080)=0x8) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x52e, &(0x7f0000000a80)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7, [@func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @var={0x5, 0x0, 0x0, 0x11}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x6b}, 0x20) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fusectl\x00', 0x0, &(0x7f0000000140)='&.\\\xd8\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nilfs2_collection_stage_transition\x00', r1}, 0x10) [ 353.648689][T19328] xt_CT: You must specify a L4 protocol and not use inversions on it [ 353.679959][T19332] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 353.688126][T19332] netlink: 'syz-executor.4': attribute type 2 has an invalid length. executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$tty20(0xc, 0x4, 0x1) sendmsg$nl_generic(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002f0001bd64cbbefba2e498fb12"], 0x14}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x600000000000000, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030000140000000000000000000000030006000000000002000000e00000020000000000000000030001000000000002000000ac1414000000000000000000030005000000000002000000ac1e0001000000000000000004000400000000000000000000000000000000000000000000000000000000000400030000000000000000000000000000000000000000000000000000000000010018"], 0xa0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x80000000, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) [ 353.699524][T19332] loop4: detected capacity change from 0 to 512 [ 353.717128][T19332] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 353.730368][T19332] ext4 filesystem being mounted at /root/syzkaller-testdir4117759423/syzkaller.rxzf6n/156/file0 supports timestamps until 2038-01-19 (0x7fffffff) executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000004c0)={0x0, 0x465f}, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4}, 0x8) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000180)='i', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000008c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="05000500000080"], 0x12) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x14, 0x0, &(0x7f0000000340)) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x3938700}}, 0x0) ioctl$KDSIGACCEPT(r3, 0x5607, 0x38) [ 353.749803][T19332] EXT4-fs error (device loop4): ext4_search_dir:1548: inode #2: block 3: comm syz-executor.4: bad entry in directory: rec_len is smaller than minimal - offset=16444, inode=113, rec_len=0, size=2048 fake=0 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000180)={[{@nobh}, {@noauto_da_alloc}, {@sysvgroups}, {@dioread_nolock}, {@noauto_da_alloc}, {@lazytime}, {@sysvgroups}, {@oldalloc}, {@jqfmt_vfsv1}]}, 0xfc, 0x550, &(0x7f0000000340)="$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") r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045515, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 353.816682][T17143] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 353.851973][T19345] loop2: detected capacity change from 0 to 1024 [ 353.860087][T19345] EXT4-fs: Ignoring removed nobh option executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_io_uring_setup(0x2ddd, &(0x7f00000006c0)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000300)=@nfc}) io_uring_enter(r1, 0x381b, 0x0, 0x0, 0x0, 0x0) [ 353.865749][T19345] EXT4-fs: Ignoring removed oldalloc option executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4, 0x7, 0x0, 0x0}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000100, 0x0, 0x0) executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffffaf00"/24, 0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 353.888902][T19345] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_BLKTRACETEARDOWN(r0, 0x227e, 0x1000000000000) executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000500)=[@in={0x2, 0x0, @rand_addr=0x64010100}]}, &(0x7f0000000180)=0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0), 0x6db6e559) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f0000000080)=0x8) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3ff}, [@call={0x85, 0x0, 0x0, 0x87}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e06921e8682d85ff9782762f86dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x5c}}, 0x0) [ 353.951180][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r0, &(0x7f0000000ec0)=[{{&(0x7f0000000300)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000100)='k', 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000340)='0', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) shutdown(r0, 0x1) getsockopt$bt_hci(r0, 0x84, 0x71, &(0x7f00000010c0)=""/4111, &(0x7f0000000000)=0x100f) executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000180)={[{@nobh}, {@noauto_da_alloc}, {@sysvgroups}, {@dioread_nolock}, {@noauto_da_alloc}, {@lazytime}, {@sysvgroups}, {@oldalloc}, {@jqfmt_vfsv1}]}, 0xfc, 0x550, &(0x7f0000000340)="$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") r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045515, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00'}, 0x10) socketpair(0x1, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0x6, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='ext4_remove_blocks\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000b40)="a2", 0xfffffd2a}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000041) close(r6) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffeeb702000008000000b703000000000000850000000e00000095b18f0b0563cd1b2ba7115509746b3af915dc661e599060be0a77a17dc421655e53bd03cd1dde63"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = getpid() r8 = syz_pidfd_open(r7, 0x0) pidfd_send_signal(r8, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x5}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='ext4_remove_blocks\x00'}, 0x10) executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x9, 0x4) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) fremovexattr(r0, &(0x7f0000001200)=@known='security.apparmor\x00') executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3ff}, [@call={0x85, 0x0, 0x0, 0x87}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e06921e8682d85ff9782762f86dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x5c}}, 0x0) executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) prlimit64(0x0, 0x7, &(0x7f0000000040)={0x6, 0x8}, 0x0) pipe(0x0) [ 354.212136][ T28] audit: type=1400 audit(2000000648.347:1168): avc: denied { setattr } for pid=19372 comm="syz-executor.4" name="PPTP" dev="sockfs" ino=65316 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 354.217202][T19375] loop2: detected capacity change from 0 to 1024 [ 354.246270][T19375] EXT4-fs: Ignoring removed nobh option [ 354.251949][T19375] EXT4-fs: Ignoring removed oldalloc option executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x40104593, 0x0) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000340), &(0x7f0000000380)=r0}, 0x20) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x52e, &(0x7f0000000a80)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7, [@func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @var={0x5, 0x0, 0x0, 0x11}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x6b}, 0x20) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fusectl\x00', 0x0, &(0x7f0000000140)='&.\\\xd8\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nilfs2_collection_stage_transition\x00', r1}, 0x10) executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f0000000380)="30803f86", 0x4, r0) [ 354.279357][T19375] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 354.317727][T19392] netlink: 'syz-executor.3': attribute type 1 has an invalid length. executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x9, 0x4) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3ff}, [@call={0x85, 0x0, 0x0, 0x87}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e06921e8682d85ff9782762f86dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) [ 354.326008][T19392] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 354.337404][T19392] loop3: detected capacity change from 0 to 512 [ 354.367291][T19392] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x40104593, 0x0) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x5c}}, 0x0) executing program 4: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB='-'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 0: syz_open_procfs$pagemap(0x0, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, r5}, {@in6=@mcast2, 0x0, 0x32}, @in=@private, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x0, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16, @ANYRES8=r1], 0x4c}}, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r7, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r7, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x4}]}) write$ppp(r7, &(0x7f0000000300)="5af9", 0xff62) [ 354.386581][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 354.387302][T19392] ext4 filesystem being mounted at /root/syzkaller-testdir1283969313/syzkaller.1boXbb/53/file0 supports timestamps until 2038-01-19 (0x7fffffff) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000a000000025000000ebd656ed74000000080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) [ 354.431367][T19392] EXT4-fs error (device loop3): ext4_search_dir:1548: inode #2: block 3: comm syz-executor.3: bad entry in directory: rec_len is smaller than minimal - offset=16444, inode=113, rec_len=0, size=2048 fake=0 [ 354.468217][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 1: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f0000000380)="30803f86", 0x4, r0) executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000180)={[{@nobh}, {@noauto_da_alloc}, {@sysvgroups}, {@dioread_nolock}, {@noauto_da_alloc}, {@lazytime}, {@sysvgroups}, {@oldalloc}, {@jqfmt_vfsv1}]}, 0xfc, 0x550, &(0x7f0000000340)="$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") r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045515, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e30000000000000010001000000000068307b746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba31300000000000000000008000000000001010000000000010c00636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e46515445554500000000000000000000000000000000000000000000000000080000000000000000000000000000040000000000000000000000004b5d0000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e64300000000000006c73c387735cc18268315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x5c}}, 0x0) executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x9, 0x4) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) iopl(0x3) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x0, 0x2710}) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_io_uring_setup(0x192a, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000000000e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000500)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000080), 0x1, 0x52e, &(0x7f0000000a80)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7, [@func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @var={0x5, 0x0, 0x0, 0x11}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x6b}, 0x20) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fusectl\x00', 0x0, &(0x7f0000000140)='&.\\\xd8\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='nilfs2_collection_stage_transition\x00', r1}, 0x10) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000a000000025000000ebd656ed74000000080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x9) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000000)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c}, 0xe80}}, 0x0) executing program 0: syz_open_procfs$pagemap(0x0, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, r5}, {@in6=@mcast2, 0x0, 0x32}, @in=@private, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x0, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16, @ANYRES8=r1], 0x4c}}, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r7, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r7, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x4}]}) write$ppp(r7, &(0x7f0000000300)="5af9", 0xff62) [ 354.652358][T19419] loop4: detected capacity change from 0 to 1024 [ 354.675950][T19419] EXT4-fs: Ignoring removed nobh option [ 354.681717][T19419] EXT4-fs: Ignoring removed oldalloc option executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) executing program 1: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f0000000380)="30803f86", 0x4, r0) executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x49, &(0x7f00000004c0)={[{@user_xattr}, {@dioread_lock}, {@data_err_abort}, {@jqfmt_vfsv1}, {@barrier}, {@noinit_itable}, {@orlov}, {@bsdgroups}, {@abort}, {@orlov}, {@quota}]}, 0x4, 0x54f, &(0x7f0000000b00)="$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") quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='./file1\x00') executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x9, 0x4) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 354.723215][T19419] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 354.746069][T19431] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19431 comm=syz-executor.3 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x0, 0x0, 0x200, 0x180, 0x0, 0x250, 0x2e8, 0x2e8, 0x250, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x118, 0x180, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x5000000, 0xf5f}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ipv6={@local, @empty, [], [], 'ip6_vti0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_io_uring_setup(0x192a, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000000000e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000500)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x7c}, {0x2c}, {0x6}]}) fchdir(0xffffffffffffffff) fsetxattr$security_capability(r1, &(0x7f0000000580), &(0x7f0000000540)=@v3={0x3000000, [{0x4, 0x6}, {0x1, 0xffffffff}]}, 0x18, 0x2) io_setup(0x3ff, &(0x7f0000000500)) close(0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000140)='proc\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000040)) syz_clone3(&(0x7f0000000300)={0x201800000, 0x0, 0x0, 0x0, {0x31}, &(0x7f0000000400)=""/248, 0xf8, &(0x7f0000000240)=""/127, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x7, {r1}}, 0x58) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000a000000025000000ebd656ed74000000080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) [ 354.793701][T19441] loop1: detected capacity change from 0 to 1024 [ 354.804911][T19441] EXT4-fs: Ignoring removed orlov option [ 354.810708][T19441] EXT4-fs: Ignoring removed orlov option [ 354.829303][T17143] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 1: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f0000000380)="30803f86", 0x4, r0) [ 354.830716][T19445] xt_CT: You must specify a L4 protocol and not use inversions on it [ 354.851716][T19441] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 354.864855][ T28] audit: type=1326 audit(2000000649.007:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19447 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa3c6f0eea9 code=0x0 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100), 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000200), &(0x7f00000000c0)=@udp, 0x1}, 0x20) executing program 2: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x2004010, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0], 0x1, 0x99d, &(0x7f0000001240)="$eJzs3c9vHGf9B/D3OPY3/rpVmrahhChtNilp3da4tkNSol5w7HXi4h/IdqRGHEhpUhTFUNSCaKMegkBISFQggTjAreLEqVKlqr2g3OAPQAghUK/cqFAPuRnNrB1vWq/XcW1vcF+v1Xh+7Gee5zM7s/N4f80T/pctLS1Vwybnz/9hJ5Pl7nNm/IO33n6zHH50Pf+XPTlZvJf0Jqkl3UkOJj1j43Oz020KuppcTHIjKZLsTWO8IRdT/CL3rs7fSPG7sl623xKfaZ0+/gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4G5UjI0PDQ0XmZqcOf98rbWqC/B17l8p7/2q1+/i/bb1JkU5pLd3pavvgwdW736o/HMshxtzvVWH5OnNtXse2v/sg91dK+uvk9COePX1a1dfWFy8/EqnE9kZ7/3wwneuXf/Z47cWnK3PTM7PTk6Pnq3XJudna6dPnRp6+tzEfG1icqo+f2F+oT5dG5urj+6dnav1jz1RGz59+kStPnhh9vzM2fHBqfrKwme+NDI0dKr23ODX66Nz87MzTz83OD92bnJqanLmbBVT3l3GPFMeiF+bXKgt1Eena7WXrixePtEu6zJoeCNBI+2CRoZGRoaHR0aGT508ffKZoaHuTywY+ph8IqLzBy2dteXncNisruX2P1OZzEzO5/nUmm4X6yc/evejv71Ry1jGM5fZTN92/+pt2Ur7f/yF+rr1Nrf/y6384YOrdx9K1f4/0ph7pFX73yKXnbu9mtdzLVfzQhazmMt5peMZ7eBtT3I29cxkMvOZzWSmM1otqS0vqeV0TuVUhvLNnMtE5lPLRCYzlXrmcyHzWUi9OqLGMpd6RrOQ2cyllv6M5YnUMlwdo+WfegZzIbM5n5mczXhGq1JeypXqcT+xTp63goY3EjSyTpD2n09v60/isElLK+0/AAAAsGt94c/Zd+CBP/0z6cnD1fvyE5NT9aFOpwUAAABsoeqT/8PlqKecejiF1/8AAACw2xTVb+yKJH050pha+SWUNwEAAABgl6g+/3+kHPWVU0dSeP0PAAAAu82ta+wfbnWN3bYRxcDK5X9rlxrjS8sRy9f57ZuYnKoPjs1OPTucx6qrDFS/NFiztJ7q5wdP5mhG/93/7o/f/9U/qui+phKLpLpIwfDgs8N5MseWN6T/0XL0aP+1e9K1WndvGTnSiHy8Efn4amRzllXkiTISAHa7Y23a4w38h1A8mYFGxMChsjFN96E1WtYhLSsA3C3a97HTNqL4cpvX/w/c+krBYF7My1nMpQxUvzaovnGwZql9TV9DGMjRRuzRvsa472PvLzT18DKwxvsBa8eOZKDNOwJ9Td3LAMBucqxNO7yR9n+gzev/Pl8pBIC7yq0e7LdxotPbCADc7g5b6X9te0IAAAAAAAAAAAAAAAAAAAAAAAAAAACwC2z79f+znT0L7NaJS9nSAg99itV/P9TxR+MzOFEUO/T0bD3R6TMTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO6FI9qy1vCvZm2QoydM7n9X2ud7pBDqsuJmbeS37Op0HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBus3z9/640xvc0FqW7Kzme5GKSb3Q6x610s9MJdFjT9f/LfZ6lIt2N3Z6iZ2x8bna63P1V3w9dH7z19pvlsJl6ygLKGm7rXGK5htZr3V+t1Td++dWr33/5e7XxM1WSZxYmpsanz859dTXwoeKdpJbGsGIl3zeO//GXa2z5O+WWbqzeiare8U/W+/m11l6/3vVcWbw8Uta0UH9+4QffvfJa010P5GjyaH/Sf3tN3y6HFjUdTc96tRUfFj8t9uU3uVjt//LRKJaKchfdV23//790ZfHy4IsvL15qkdP+HElyKendeE5HqvPJmqqjrqunrHWoCir/HGhT3rqaShxusQ33V4dM3x1tQ631NlRaP+6N9RoZnWiR0YN57I739GPr7+kWyXxY/L04l7/mJ039f3SV+/94NvLsLGOqyKYjpWVkVyOy2vKRNQNWJlo+K9kGP8+38pVb+7+r6fy/vK+27Hy0d73zUVON2/m82NOcTnl2+ViLtHz2aZXlcp4HGlEt8vxcnkq6D93RGeWp1meUPZvZzjYaz7Xiw+K3RX/+k+v6/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO5+RbJnreVdyfEk+5PcV87XkqWtqK+rr7j8l60oaJOud7Duu0FxMzfzWvZ1Og8AAAAAAAAAtsaZ8Q/eevvNcijK2T35YvFe0tv4pL87yf7i1z1j43Oz020K6kkuJrmxiRzK9XLv6vyNcu7gJgoCADbkvwEAAP//LXdxLw==") r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x7000522) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000400)=""/258, 0x102) fcntl$setstatus(r1, 0x4, 0x42c00) getdents(r1, 0x0, 0x15180) executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f00000008c0)=0x5) tee(r0, r1, 0x7, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) ioctl$FS_IOC_RESVSP(r3, 0x4030582b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1fd, 0x0, 0xf0}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000e, 0x28011, r2, 0x0) [ 354.906175][ T28] audit: type=1400 audit(2000000649.037:1170): avc: denied { quotaon } for pid=19440 comm="syz-executor.1" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 354.906368][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000040)='syscall\x00') pread64(r4, &(0x7f0000000340)=""/254, 0xfe, 0x0) [ 354.980868][T19456] loop2: detected capacity change from 0 to 1764 [ 354.989371][ T28] audit: type=1400 audit(2000000649.127:1171): avc: denied { setattr } for pid=19447 comm="syz-executor.0" name="" dev="pipefs" ino=59111 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f00000008c0)=0x5) tee(r0, r1, 0x7, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) ioctl$FS_IOC_RESVSP(r3, 0x4030582b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1fd, 0x0, 0xf0}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000e, 0x28011, r2, 0x0) executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x7, 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) sendto$inet6(r0, &(0x7f0000000140)="991e643300ad74810756", 0xa, 0x0, 0x0, 0x0) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000f5ff00000000ff908892450000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_emit_ethernet(0xfffffdef, &(0x7f0000004540)={@link_local, @empty, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "2a80c9", 0x44, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) [ 355.025031][ T28] audit: type=1400 audit(2000000649.157:1172): avc: denied { watch } for pid=19455 comm="syz-executor.2" path="/root/syzkaller-testdir3207284210/syzkaller.h1izBV/597/file0/file0" dev="loop2" ino=1856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=dir permissive=1 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_io_uring_setup(0x192a, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000000000e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000500)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) executing program 4: io_setup(0x5, &(0x7f0000001140)) io_setup(0x7, &(0x7f0000000000)) io_setup(0x253, &(0x7f00000000c0)) io_setup(0x7bba, &(0x7f0000000080)) io_setup(0x2, &(0x7f0000001180)) executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f0000000000)=@framed={{}, [@snprintf={{0x5}, {}, {}, {}, {0x7, 0x1, 0xb, 0x1, 0x3}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000300)='GPL\x00', 0x8, 0xff8, &(0x7f0000001e00)=""/4088}, 0x90) executing program 1: io_setup(0x5, &(0x7f0000001140)) io_setup(0x7, &(0x7f0000000000)) io_setup(0x253, &(0x7f00000000c0)) io_setup(0x7bba, &(0x7f0000000080)) io_setup(0x2, &(0x7f0000001180)) executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000040)='syscall\x00') pread64(r4, &(0x7f0000000340)=""/254, 0xfe, 0x0) executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={r3}, 0x8) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000f5ff00000000ff908892450000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_emit_ethernet(0xfffffdef, &(0x7f0000004540)={@link_local, @empty, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "2a80c9", 0x44, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x7, 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) sendto$inet6(r0, &(0x7f0000000140)="991e643300ad74810756", 0xa, 0x0, 0x0, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x6, 0x0, 0x0, "a3f4fe5d8e01"}}) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x58, 0x3, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) executing program 1: io_setup(0x5, &(0x7f0000001140)) io_setup(0x7, &(0x7f0000000000)) io_setup(0x253, &(0x7f00000000c0)) io_setup(0x7bba, &(0x7f0000000080)) io_setup(0x2, &(0x7f0000001180)) executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f0000000380)="30803f86", 0x4, r0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988d0e433454eac5b3bf9aa281383a37e35de94df591b29965d3d2e3a077018eacb73ff67ac4742e179043ccdc728de39e454f8761e58601ed395dc781e49ec1c24df917950f19a9606eb8ec436c15c8c262b7802f6cfbf5e50cf405840675e563541", 0xff8d}], 0x1}, 0x40) recvmsg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000340), &(0x7f0000000380)=r0}, 0x20) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000f5ff00000000ff908892450000000e000000850000005000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_emit_ethernet(0xfffffdef, &(0x7f0000004540)={@link_local, @empty, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "2a80c9", 0x44, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) pipe(&(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x780}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000001700)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x6a0c2, 0x0) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x400017e) ppoll(&(0x7f0000000500)=[{}, {r3, 0xa1caac9f2fa8efad}, {r4, 0x4745}], 0x3, &(0x7f0000000580)={0x77359400}, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000500)) io_submit(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x7, 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) sendto$inet6(r0, &(0x7f0000000140)="991e643300ad74810756", 0xa, 0x0, 0x0, 0x0) executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg$inet(r1, &(0x7f0000000400)=[{{&(0x7f0000000240)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="ac363fffc5a0c6d62d6806169cb8da", 0xf}, {&(0x7f00000002c0)="aeb2e1869c80c6ebe263470a82c36ae9c5d02b448202e1a6dcbdc07dd274470bbe607780fdc57641b63e767cbd55b8f44a10ce2729e7136df7b26b76cc8ffaa215e2c537bce285b7f731b2d6f6b7bfa974f462d24f97b54810903d43eb0c8a5cd3ab2572ec20418ea4fcb6a4f9414e627617936905fcc24fde5aebaa40d2d85f6a100e23b45ddc5746b9384779bb1380b24e4d831736ac7ae352c80ddc8a221d4975e5af6ad04d226435a1406fc4a7c9efea506161daffce987b25aefb6e37848a960c0afe5193e01973ff041de644083398645772c992d32c0485520a74893a8cfea6f8fb6f24f839c49ab17436651b1b82b4b0c7b9", 0xf6}], 0x2}}], 0x1, 0x891) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x10}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x5, 0x100}, @sack_perm, @timestamp], 0x3) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000500), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r6, &(0x7f0000000440)="c8c9bd73ef8dd574d610459fff8482e362a4b4692ccdad09766e476282c3044334332a58b789bd4c50ac0223032e01275465b13d6c8159f32318b0c4953a33642a8359847b5791907cc669", 0x4b, 0x1, &(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x1a, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x9, 0x4) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$P9_RGETLOCK(r0, 0x0, 0x0) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg$inet(r1, &(0x7f0000000400)=[{{&(0x7f0000000240)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="ac363fffc5a0c6d62d6806169cb8da", 0xf}, {&(0x7f00000002c0)="aeb2e1869c80c6ebe263470a82c36ae9c5d02b448202e1a6dcbdc07dd274470bbe607780fdc57641b63e767cbd55b8f44a10ce2729e7136df7b26b76cc8ffaa215e2c537bce285b7f731b2d6f6b7bfa974f462d24f97b54810903d43eb0c8a5cd3ab2572ec20418ea4fcb6a4f9414e627617936905fcc24fde5aebaa40d2d85f6a100e23b45ddc5746b9384779bb1380b24e4d831736ac7ae352c80ddc8a221d4975e5af6ad04d226435a1406fc4a7c9efea506161daffce987b25aefb6e37848a960c0afe5193e01973ff041de644083398645772c992d32c0485520a74893a8cfea6f8fb6f24f839c49ab17436651b1b82b4b0c7b9", 0xf6}], 0x2}}], 0x1, 0x891) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x10}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x5, 0x100}, @sack_perm, @timestamp], 0x3) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000500), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r6, &(0x7f0000000440)="c8c9bd73ef8dd574d610459fff8482e362a4b4692ccdad09766e476282c3044334332a58b789bd4c50ac0223032e01275465b13d6c8159f32318b0c4953a33642a8359847b5791907cc669", 0x4b, 0x1, &(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x1a, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) executing program 0: io_setup(0x5, &(0x7f0000001140)) io_setup(0x7, &(0x7f0000000000)) io_setup(0x253, &(0x7f00000000c0)) io_setup(0x7bba, &(0x7f0000000080)) io_setup(0x2, &(0x7f0000001180)) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000340), &(0x7f0000000380)=r0}, 0x20) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988d0e433454eac5b3bf9aa281383a37e35de94df591b29965d3d2e3a077018eacb73ff67ac4742e179043ccdc728de39e454f8761e58601ed395dc781e49ec1c24df917950f19a9606eb8ec436c15c8c262b7802f6cfbf5e50cf405840675e563541", 0xff8d}], 0x1}, 0x40) recvmsg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) executing program 2: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009500000057"], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x6d, &(0x7f00000000c0)=""/109}, 0x90) executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) read(r1, &(0x7f0000000200)=""/209, 0xd1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x335}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0xc02c5341, &(0x7f00000000c0)) tkill(r0, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000440)) executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) fremovexattr(r0, &(0x7f0000001200)=@known='security.apparmor\x00') executing program 0: socket(0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="0400", 0x2}], 0x1}}], 0x1, 0x4000c000) sendto$inet6(r0, &(0x7f0000000300), 0x2, 0x0, 0x0, 0xfffffffffffffdfd) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000090000003c0003800800010001000000140002007663616e3000000000000000000000000800030000000000140006"], 0x50}}, 0x0) executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) prlimit64(0x0, 0x7, &(0x7f0000000040)={0x6, 0x8}, 0x0) pipe(0x0) executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x98000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000006340)='./file0\x00') readlink(&(0x7f0000001280)='./file0\x00', &(0x7f0000001300)=""/6, 0x6) executing program 0: syz_open_procfs$pagemap(0x0, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, r5}, {@in6=@mcast2, 0x0, 0x32}, @in=@private, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x0, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16, @ANYRES8=r1], 0x4c}}, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r7, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r7, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x4}]}) write$ppp(r7, &(0x7f0000000300)="5af9", 0xff62) executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) read(r1, &(0x7f0000000200)=""/209, 0xd1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x335}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0xc02c5341, &(0x7f00000000c0)) tkill(r0, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000440)) executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000940)={0x24, @short}, 0x14) pipe(0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x8, 0x7f, 0x8, 0x3, 0x19, "9eb0f480f63aa9e5f9ef2b3c02f52e2cd9dfee"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x98}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0) epoll_create(0x0) setrlimit(0x3, &(0x7f0000000180)={0x80000000}) mlockall(0x0) executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x5}, {0x6}]}, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000040)='syscall\x00') pread64(r4, &(0x7f0000000340)=""/254, 0xfe, 0x0) executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x98000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000006340)='./file0\x00') readlink(&(0x7f0000001280)='./file0\x00', &(0x7f0000001300)=""/6, 0x6) executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000380)={0x18, 0x37, 0x1, 0x0, 0x0, "", [@typed={0x4}, @generic='D']}, 0x18}], 0x1}, 0x0) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) pipe(&(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x780}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000001700)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x6a0c2, 0x0) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x400017e) ppoll(&(0x7f0000000500)=[{}, {r3, 0xa1caac9f2fa8efad}, {r4, 0x4745}], 0x3, &(0x7f0000000580)={0x77359400}, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000500)) io_submit(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) executing program 4: io_setup(0x5, &(0x7f0000001140)) io_setup(0x7, &(0x7f0000000000)) io_setup(0x253, &(0x7f00000000c0)) io_setup(0x7bba, &(0x7f0000000080)) io_setup(0x2, &(0x7f0000001180)) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x1f}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x0) executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x5}, {0x6}]}, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x1}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x200000003, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8000, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) write$tun(r3, &(0x7f00000000c0)=ANY=[], 0x2a) executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000380)={0x18, 0x37, 0x1, 0x0, 0x0, "", [@typed={0x4}, @generic='D']}, 0x18}], 0x1}, 0x0) executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x485, &(0x7f0000000580)={[{@errors_remount}, {@user_xattr}, {@noload}]}, 0x3, 0x4bc, &(0x7f00000000c0)="$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") executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000001080), 0x1, 0x4e2, &(0x7f0000000b80)="$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") r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000005c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@jmp={0x6, 0x0, 0xc, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xf6, &(0x7f0000000180)=""/246}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000008000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000680)=ANY=[], 0x89b9) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg$inet(r1, &(0x7f0000000400)=[{{&(0x7f0000000240)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="ac363fffc5a0c6d62d6806169cb8da", 0xf}, {&(0x7f00000002c0)="aeb2e1869c80c6ebe263470a82c36ae9c5d02b448202e1a6dcbdc07dd274470bbe607780fdc57641b63e767cbd55b8f44a10ce2729e7136df7b26b76cc8ffaa215e2c537bce285b7f731b2d6f6b7bfa974f462d24f97b54810903d43eb0c8a5cd3ab2572ec20418ea4fcb6a4f9414e627617936905fcc24fde5aebaa40d2d85f6a100e23b45ddc5746b9384779bb1380b24e4d831736ac7ae352c80ddc8a221d4975e5af6ad04d226435a1406fc4a7c9efea506161daffce987b25aefb6e37848a960c0afe5193e01973ff041de644083398645772c992d32c0485520a74893a8cfea6f8fb6f24f839c49ab17436651b1b82b4b0c7b9", 0xf6}], 0x2}}], 0x1, 0x891) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x10}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x5, 0x100}, @sack_perm, @timestamp], 0x3) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000500), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r6, &(0x7f0000000440)="c8c9bd73ef8dd574d610459fff8482e362a4b4692ccdad09766e476282c3044334332a58b789bd4c50ac0223032e01275465b13d6c8159f32318b0c4953a33642a8359847b5791907cc669", 0x4b, 0x1, &(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x1a, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988d0e433454eac5b3bf9aa281383a37e35de94df591b29965d3d2e3a077018eacb73ff67ac4742e179043ccdc728de39e454f8761e58601ed395dc781e49ec1c24df917950f19a9606eb8ec436c15c8c262b7802f6cfbf5e50cf405840675e563541", 0xff8d}], 0x1}, 0x40) recvmsg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="1a", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)='|', 0x1, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)="93", 0xffbc, 0x0, 0x0, 0x44) executing program 0: gettid() timer_create(0x0, 0x0, &(0x7f00000000c0)) [ 356.874486][T19603] loop1: detected capacity change from 0 to 512 executing program 0: pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000340)="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", 0xf41}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000640)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000b00)=[{&(0x7f0000004500)="d3", 0x1}], 0x1}}], 0x1, 0x0) shutdown(r0, 0x1) getsockopt$bt_hci(r0, 0x84, 0x81, &(0x7f0000001280)=""/4105, &(0x7f0000001080)=0x1009) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r1, 0x80080400) r2 = socket$inet_dccp(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r3 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x20) r4 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r4, 0x0, 0x0) dup3(r3, r4, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r2, 0x10d, 0xcc, &(0x7f0000000000), &(0x7f0000000240)=0x4) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r5, 0x0, 0x0, 0xfffffffffffffffe, 0x0) [ 356.926211][T19603] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 356.941276][T19603] ext4 filesystem being mounted at /root/syzkaller-testdir2336598955/syzkaller.1pnGz5/358/file0 supports timestamps until 2038-01-19 (0x7fffffff) executing program 4: socket(0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="0400", 0x2}], 0x1}}], 0x1, 0x4000c000) sendto$inet6(r0, &(0x7f0000000300), 0x2, 0x0, 0x0, 0xfffffffffffffdfd) [ 356.983215][T19603] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #19: comm syz-executor.1: corrupted inode contents [ 356.995805][T19603] EXT4-fs error (device loop1): ext4_dirty_inode:5942: inode #19: comm syz-executor.1: mark_inode_dirty error [ 357.007898][T19603] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #19: comm syz-executor.1: corrupted inode contents [ 357.021196][T19603] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2992: inode #19: comm syz-executor.1: mark_inode_dirty error [ 357.041179][T19603] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2995: inode #19: comm syz-executor.1: mark inode dirty (error -117) [ 357.063071][T19603] EXT4-fs warning (device loop1): ext4_evict_inode:271: xattr delete (err -117) [ 357.098111][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="58000000140091d427323b4725458db45602117fffefff81000e224e227f0000017b00090080007f000001e809000000ff0000f03ac7100003ffffffffffff0000000110", 0x44}], 0x1) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000180)={0x8, &(0x7f0000000100)=[{0x3, 0x6}, {0x5, 0x9}, {0x6, 0x5}, {0x400, 0x7}, {0x985, 0x80}, {0x8, 0xffff}, {0x0, 0x1}, {0x5, 0x6}]}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000002ec0)=""/4096, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x8, &(0x7f0000000140)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x401}, 0x90) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000080)="441f0810000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x60142, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000100)='./file0\x00', 0x810082, &(0x7f0000000540)={[{@utf8no}, {@rodir}, {@uni_xlateno}, {@shortname_winnt}, {@utf8no}, {@shortname_mixed}, {@uni_xlateno}, {@fat=@gid}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'default'}}, {@utf8}, {@utf8}, {@fat=@check_normal}, {@fat=@nfs_nostale_ro}, {@uni_xlate}, {@shortname_win95}, {@fat=@discard}]}, 0x0, 0x2ad, &(0x7f0000000280)="$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") pipe2$9p(0x0, 0x0) dup(0xffffffffffffffff) r3 = open(0x0, 0x14d27e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000380)={0x2, 0x0, @remote}, 0x10) sendmmsg(r4, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r5, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) ftruncate(0xffffffffffffffff, 0x0) r6 = epoll_create1(0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000020c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000002100)={0x60000004}) read(r7, &(0x7f0000000040)=""/4096, 0x1000) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r7, &(0x7f0000000000)={0x20000001}) sendto$inet(r2, &(0x7f00000000c0)='d', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) arch_prctl$ARCH_SHSTK_UNLOCK(0x5004, 0x0) executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000280)='signal_generate\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xad}}, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000fc0), &(0x7f0000001000), 0x8) executing program 0: pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000340)="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", 0xf41}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000640)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000b00)=[{&(0x7f0000004500)="d3", 0x1}], 0x1}}], 0x1, 0x0) shutdown(r0, 0x1) getsockopt$bt_hci(r0, 0x84, 0x81, &(0x7f0000001280)=""/4105, &(0x7f0000001080)=0x1009) executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x98000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000006340)='./file0\x00') readlink(&(0x7f0000001280)='./file0\x00', &(0x7f0000001300)=""/6, 0x6) executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f0000000000)=@framed={{}, [@snprintf={{0x5}, {}, {}, {}, {0x7, 0x1, 0xb, 0x1, 0x3}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000300)='GPL\x00', 0x8, 0xff8, &(0x7f0000001e00)=""/4088}, 0x90) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r1, 0x80080400) r2 = socket$inet_dccp(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r3 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x20) r4 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r4, 0x0, 0x0) dup3(r3, r4, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r2, 0x10d, 0xcc, &(0x7f0000000000), &(0x7f0000000240)=0x4) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r5, 0x0, 0x0, 0xfffffffffffffffe, 0x0) executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg$inet(r1, &(0x7f0000000400)=[{{&(0x7f0000000240)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="ac363fffc5a0c6d62d6806169cb8da", 0xf}, {&(0x7f00000002c0)="aeb2e1869c80c6ebe263470a82c36ae9c5d02b448202e1a6dcbdc07dd274470bbe607780fdc57641b63e767cbd55b8f44a10ce2729e7136df7b26b76cc8ffaa215e2c537bce285b7f731b2d6f6b7bfa974f462d24f97b54810903d43eb0c8a5cd3ab2572ec20418ea4fcb6a4f9414e627617936905fcc24fde5aebaa40d2d85f6a100e23b45ddc5746b9384779bb1380b24e4d831736ac7ae352c80ddc8a221d4975e5af6ad04d226435a1406fc4a7c9efea506161daffce987b25aefb6e37848a960c0afe5193e01973ff041de644083398645772c992d32c0485520a74893a8cfea6f8fb6f24f839c49ab17436651b1b82b4b0c7b9", 0xf6}], 0x2}}], 0x1, 0x891) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x10}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x5, 0x100}, @sack_perm, @timestamp], 0x3) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000500), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r6, &(0x7f0000000440)="c8c9bd73ef8dd574d610459fff8482e362a4b4692ccdad09766e476282c3044334332a58b789bd4c50ac0223032e01275465b13d6c8159f32318b0c4953a33642a8359847b5791907cc669", 0x4b, 0x1, &(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x1a, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) [ 357.282805][T19625] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO executing program 1: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) executing program 3: open(0x0, 0x80ff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0xa, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='tlb_flush\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x4f9}) prlimit64(0x0, 0x7862c766ad62c11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="3000000000000000840000000100000000000048010200000000000000000000000000717388b9000000", @ANYRES32=r3], 0x30}, 0x4005) executing program 0: open(0x0, 0x80ff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0xa, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='tlb_flush\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x4f9}) prlimit64(0x0, 0x7862c766ad62c11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="3000000000000000840000000100000000000048010200000000000000000000000000717388b9000000", @ANYRES32=r3], 0x30}, 0x4005) executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000fc0), &(0x7f0000001000), 0x8) [ 357.366388][T19640] loop2: detected capacity change from 0 to 256 executing program 3: pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000340)="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", 0xf41}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000640)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000b00)=[{&(0x7f0000004500)="d3", 0x1}], 0x1}}], 0x1, 0x0) shutdown(r0, 0x1) getsockopt$bt_hci(r0, 0x84, 0x81, &(0x7f0000001280)=""/4105, &(0x7f0000001080)=0x1009) executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="58000000140091d427323b4725458db45602117fffefff81000e224e227f0000017b00090080007f000001e809000000ff0000f03ac7100003ffffffffffff0000000110", 0x44}], 0x1) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x98000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000006340)='./file0\x00') readlink(&(0x7f0000001280)='./file0\x00', &(0x7f0000001300)=""/6, 0x6) executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0842b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508011132153c528f7bca92980a3223c5b9cdddedb0a14adddf9a6e70a26b5c0ee0879c349814bee9d96d8bd23db4e801d49201ae84090455682794098afa42b34196b1d849020eeeb1ef48d003d71524683d7cdfa841bca708414fb8ff49742420d1ab7fa678aa4806d5247616e8bc0b02887f8efe9310ccf9bec1c9b7f6671c9d59ac6b09b4436cafdd1887c8e884c930d21ace088ccc99a94d4b33da2fc1b1310bb607a9ad65844655de1ac9fd36d12e07a821fb950368a970c58fb4f3f403fdaf68902874"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000280)='signal_generate\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xad}}, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r1, 0x80080400) r2 = socket$inet_dccp(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r3 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x20) r4 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r4, 0x0, 0x0) dup3(r3, r4, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r2, 0x10d, 0xcc, &(0x7f0000000000), &(0x7f0000000240)=0x4) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r5, 0x0, 0x0, 0xfffffffffffffffe, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x1f}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) [ 357.450343][T19652] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO executing program 0: open(0x0, 0x80ff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0xa, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='tlb_flush\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x4f9}) prlimit64(0x0, 0x7862c766ad62c11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="3000000000000000840000000100000000000048010200000000000000000000000000717388b9000000", @ANYRES32=r3], 0x30}, 0x4005) executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000001c0)={{0x0, 0x3938700}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$eventfd(r1, &(0x7f0000000080), 0x8) executing program 0: pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000340)="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", 0xf41}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000640)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000b00)=[{&(0x7f0000004500)="d3", 0x1}], 0x1}}], 0x1, 0x0) shutdown(r0, 0x1) getsockopt$bt_hci(r0, 0x84, 0x81, &(0x7f0000001280)=""/4105, &(0x7f0000001080)=0x1009) executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="58000000140091d427323b4725458db45602117fffefff81000e224e227f0000017b00090080007f000001e809000000ff0000f03ac7100003ffffffffffff0000000110", 0x44}], 0x1) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000200000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000780)='GPL\x00', 0x1, 0xf7, &(0x7f00000005c0)=""/247, 0x0, 0x0, '\x00', r1}, 0x90) executing program 3: r0 = socket(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x900}, 0xc, &(0x7f0000000040)={&(0x7f0000001500)=@newtaction={0x18, 0x31, 0x829, 0x0, 0x0, {0x0, 0x0, 0x2}, [{0x4}]}, 0x18}}, 0x0) executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg$inet(r1, &(0x7f0000000400)=[{{&(0x7f0000000240)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="ac363fffc5a0c6d62d6806169cb8da", 0xf}, {&(0x7f00000002c0)="aeb2e1869c80c6ebe263470a82c36ae9c5d02b448202e1a6dcbdc07dd274470bbe607780fdc57641b63e767cbd55b8f44a10ce2729e7136df7b26b76cc8ffaa215e2c537bce285b7f731b2d6f6b7bfa974f462d24f97b54810903d43eb0c8a5cd3ab2572ec20418ea4fcb6a4f9414e627617936905fcc24fde5aebaa40d2d85f6a100e23b45ddc5746b9384779bb1380b24e4d831736ac7ae352c80ddc8a221d4975e5af6ad04d226435a1406fc4a7c9efea506161daffce987b25aefb6e37848a960c0afe5193e01973ff041de644083398645772c992d32c0485520a74893a8cfea6f8fb6f24f839c49ab17436651b1b82b4b0c7b9", 0xf6}], 0x2}}], 0x1, 0x891) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x10}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x5, 0x100}, @sack_perm, @timestamp], 0x3) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000500), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r6, &(0x7f0000000440)="c8c9bd73ef8dd574d610459fff8482e362a4b4692ccdad09766e476282c3044334332a58b789bd4c50ac0223032e01275465b13d6c8159f32318b0c4953a33642a8359847b5791907cc669", 0x4b, 0x1, &(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x1a, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000380)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r0, &(0x7f00000000c0)={r3}) [ 357.567975][T19670] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000001c0)={{0x0, 0x3938700}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$eventfd(r1, &(0x7f0000000080), 0x8) executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="58000000140091d427323b4725458db45602117fffefff81000e224e227f0000017b00090080007f000001e809000000ff0000f03ac7100003ffffffffffff0000000110", 0x44}], 0x1) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000200000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000780)='GPL\x00', 0x1, 0xf7, &(0x7f00000005c0)=""/247, 0x0, 0x0, '\x00', r1}, 0x90) [ 357.684694][T19687] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000004c0)={0x0, 0x465f}, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4}, 0x8) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000180)='i', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000008c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="05000500000080"], 0x12) executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvlan0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000004c0)={r2, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x3, 0x6, @random="cea0300a1672"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @dev}, 0x10) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x10002, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r0}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x4}, 0x38) [ 358.164977][T19691] macvlan0: entered promiscuous mode [ 358.184539][T19690] macvlan0: left promiscuous mode executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001340), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="b406000000ffe40073113200000000008514000002000000b7000000000000009500c200000000009500001200000000fa73b72cbb3bbe83b2cf29f16bc0219b9c693afc5931111146c1ec5b02fb3aadf335af50d2be89a0cb1fcf28e730c7c2870f09a8d2a8fbf5b483487d597510e3c748f425e44ffc"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) io_setup(0x9, &(0x7f0000000b80)=0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000180)={0xffffff}, 0x10) write(r2, &(0x7f0000000000)="240000005f005f0314f9f407000904008100000001000000000000000800040001000000", 0x24) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f00000002c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000009c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000af750000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r4, r4]}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xd, 0x5a87, 0x4, 0x3, 0x0, r4}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0x2, r5}, 0x27) executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x5}, {0x6}]}, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000005c00)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000940)=[@dontfrag={{0x14}}, @hoplimit={{0x14}}, @hopopts_2292={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}], 0x60}}], 0x1, 0x0) executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000040)=""/104, 0x4d) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getsockopt$inet_mptcp_buf(r0, 0x11c, 0x3, &(0x7f0000000040)=""/185, &(0x7f0000000100)=0xb9) executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000280)='signal_generate\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xad}}, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) [ 358.388317][ T3084] ================================================================== [ 358.396457][ T3084] BUG: KCSAN: data-race in virtqueue_disable_cb / vring_interrupt [ 358.404253][ T3084] [ 358.406555][ T3084] write to 0xffff88810296e552 of 1 bytes by interrupt on cpu 1: [ 358.414174][ T3084] vring_interrupt+0x12b/0x180 [ 358.419282][ T3084] __handle_irq_event_percpu+0x95/0x490 [ 358.424898][ T3084] handle_irq_event+0x64/0xf0 [ 358.429565][ T3084] handle_edge_irq+0x16d/0x5b0 [ 358.434317][ T3084] __common_interrupt+0x58/0xf0 [ 358.439168][ T3084] common_interrupt+0x7c/0x90 [ 358.443841][ T3084] asm_common_interrupt+0x26/0x40 [ 358.448846][ T3084] kcsan_setup_watchpoint+0x404/0x410 [ 358.454205][ T3084] unmap_page_range+0xa26/0x22d0 [ 358.459127][ T3084] unmap_single_vma+0x142/0x1d0 [ 358.463963][ T3084] unmap_vmas+0x18d/0x2b0 [ 358.468316][ T3084] exit_mmap+0x1a2/0x6f0 [ 358.472549][ T3084] __mmput+0x28/0x1c0 [ 358.476541][ T3084] mmput+0x4c/0x60 [ 358.480366][ T3084] exit_mm+0xe4/0x190 [ 358.484338][ T3084] do_exit+0x57e/0x1740 [ 358.488478][ T3084] do_group_exit+0x102/0x150 [ 358.493047][ T3084] get_signal+0xf2f/0x1080 [ 358.497448][ T3084] arch_do_signal_or_restart+0x95/0x4b0 [ 358.502974][ T3084] syscall_exit_to_user_mode+0x59/0x130 [ 358.508504][ T3084] do_syscall_64+0xda/0x1d0 [ 358.512990][ T3084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 358.518877][ T3084] [ 358.521180][ T3084] read to 0xffff88810296e552 of 1 bytes by task 3084 on cpu 0: [ 358.528699][ T3084] virtqueue_disable_cb+0x92/0x180 [ 358.533791][ T3084] start_xmit+0x125/0xb60 [ 358.538102][ T3084] dev_hard_start_xmit+0x119/0x3f0 [ 358.543199][ T3084] sch_direct_xmit+0x1b0/0x580 [ 358.547955][ T3084] __dev_queue_xmit+0xee7/0x1e50 [ 358.552877][ T3084] ip_finish_output2+0x73b/0x8b0 [ 358.557812][ T3084] ip_finish_output+0x11a/0x2a0 [ 358.562644][ T3084] ip_output+0xab/0x170 [ 358.566783][ T3084] __ip_queue_xmit+0xbca/0xbf0 [ 358.571529][ T3084] ip_queue_xmit+0x38/0x50 [ 358.575927][ T3084] __tcp_transmit_skb+0x15b0/0x1970 [ 358.581126][ T3084] tcp_write_xmit+0x12dd/0x2ff0 [ 358.585959][ T3084] __tcp_push_pending_frames+0x6a/0x1a0 [ 358.591491][ T3084] tcp_push+0x320/0x340 [ 358.595634][ T3084] tcp_sendmsg_locked+0x21c9/0x26c0 [ 358.600826][ T3084] tcp_sendmsg+0x30/0x50 [ 358.605053][ T3084] inet_sendmsg+0x77/0xd0 [ 358.609361][ T3084] __sock_sendmsg+0x102/0x180 [ 358.614018][ T3084] sock_write_iter+0x164/0x1b0 [ 358.618765][ T3084] vfs_write+0x771/0x8e0 [ 358.622989][ T3084] ksys_write+0xeb/0x1b0 [ 358.627216][ T3084] __x64_sys_write+0x42/0x50 [ 358.631786][ T3084] x64_sys_call+0x27b7/0x2d30 [ 358.636447][ T3084] do_syscall_64+0xcd/0x1d0 [ 358.640937][ T3084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 358.646813][ T3084] [ 358.649117][ T3084] value changed: 0x00 -> 0x01 [ 358.653767][ T3084] [ 358.656072][ T3084] Reported by Kernel Concurrency Sanitizer on: [ 358.662228][ T3084] CPU: 0 PID: 3084 Comm: syz-fuzzer Tainted: G W 6.9.0-rc4-syzkaller-00266-g977b1ef51866 #0 [ 358.673685][ T3084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 358.683719][ T3084] ================================================================== [ 358.734836][T19708] loop3: detected capacity change from 0 to 256 [ 359.075068][T19736] loop2: detected capacity change from 0 to 512 [ 359.087298][T19736] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 359.100205][T19736] ext4 filesystem being mounted at /root/syzkaller-testdir3207284210/syzkaller.h1izBV/608/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 359.132743][T19736] EXT4-fs error (device loop2): ext4_do_update_inode:5082: inode #19: comm syz-executor.2: corrupted inode contents [ 359.145107][T19736] EXT4-fs error (device loop2): ext4_dirty_inode:5942: inode #19: comm syz-executor.2: mark_inode_dirty error [ 359.157011][T19736] EXT4-fs error (device loop2): ext4_do_update_inode:5082: inode #19: comm syz-executor.2: corrupted inode contents [ 359.169338][T19736] EXT4-fs error (device loop2): ext4_xattr_delete_inode:2992: inode #19: comm syz-executor.2: mark_inode_dirty error [ 359.181803][T19736] EXT4-fs error (device loop2): ext4_xattr_delete_inode:2995: inode #19: comm syz-executor.2: mark inode dirty (error -117) [ 359.195042][T19736] EXT4-fs warning (device loop2): ext4_evict_inode:271: xattr delete (err -117) [ 359.212023][T12343] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 360.054524][ T28] audit: type=1326 audit(2000000654.187:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19778 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa3c6f0eea9 code=0x0 [ 360.168921][T19787] loop1: detected capacity change from 0 to 512 [ 360.179089][T19787] EXT4-fs (loop1): orphan cleanup on readonly fs [ 360.188454][T19787] EXT4-fs error (device loop1): ext4_validate_block_bitmap:432: comm syz-executor.1: bg 0: block 5: invalid block bitmap [ 360.202209][T19787] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 360.211896][T19787] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #11: comm syz-executor.1: invalid indirect mapped block 3 (level 2) [ 360.226194][T19787] EXT4-fs (loop1): 1 orphan inode deleted [ 360.231946][T19787] EXT4-fs (loop1): 1 truncate cleaned up [ 360.237743][T19787] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 360.253098][ T28] audit: type=1400 audit(2000000654.387:1174): avc: denied { read } for pid=19786 comm="syz-executor.1" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 360.275744][ T28] audit: type=1400 audit(2000000654.387:1175): avc: denied { open } for pid=19786 comm="syz-executor.1" path="/root/syzkaller-testdir2336598955/syzkaller.1pnGz5/366/file0/file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 360.306417][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 360.338599][ T28] audit: type=1400 audit(2000000654.477:1176): avc: denied { execute } for pid=19794 comm="syz-executor.2" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 360.375096][T19802] macvlan0: entered promiscuous mode [ 360.382652][T19801] macvlan0: left promiscuous mode [ 360.387752][ T28] audit: type=1400 audit(2000000654.517:1177): avc: denied { shutdown } for pid=19803 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 360.410645][T19804] loop1: detected capacity change from 0 to 764 [ 360.492604][T19811] loop2: detected capacity change from 0 to 256 [ 360.553665][T19815] loop3: detected capacity change from 0 to 256 [ 360.751709][T19833] loop3: detected capacity change from 0 to 256 [ 360.785824][T19835] loop3: detected capacity change from 0 to 256 [ 360.873424][T19845] loop3: detected capacity change from 0 to 512 [ 360.882121][T19845] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 360.891240][T19845] EXT4-fs (loop3): orphan cleanup on readonly fs [ 360.897921][T19845] Quota error (device loop3): v2_read_file_info: Block with free entry 1 out of range (1, 6). [ 360.908370][T19845] EXT4-fs warning (device loop3): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 360.923214][T19845] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 360.930368][T19845] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 40: padding at end of block bitmap is not set [ 360.945324][T19845] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 360.954441][T19845] EXT4-fs (loop3): 1 truncate cleaned up [ 360.960155][T19845] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 360.980959][T19845] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #16: comm syz-executor.3: corrupted xattr block 31: invalid header [ 360.995333][T19845] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop3 ino=16 [ 361.004660][T19845] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #16: comm syz-executor.3: corrupted xattr block 31: invalid header [ 361.019105][T19845] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop3 ino=16 [ 361.028285][ T28] audit: type=1400 audit(2000000655.167:1178): avc: denied { read } for pid=19844 comm="syz-executor.3" name="file2" dev="loop3" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 361.028341][T19845] EXT4-fs error (device loop3): ext4_get_link:106: inode #16: comm syz-executor.3: bad symlink. [ 361.061259][T19854] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #16: comm syz-executor.3: corrupted xattr block 31: invalid header [ 361.075545][T19854] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop3 ino=16 [ 361.084935][T19854] EXT4-fs error (device loop3): ext4_get_link:106: inode #16: comm syz-executor.3: bad symlink. [ 361.090583][T19857] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 361.121878][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 361.255544][T19875] loop3: detected capacity change from 0 to 512 [ 361.264002][T19875] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 361.272931][T19875] EXT4-fs (loop3): orphan cleanup on readonly fs [ 361.280109][T19875] Quota error (device loop3): v2_read_file_info: Block with free entry 1 out of range (1, 6). [ 361.290856][T19875] EXT4-fs warning (device loop3): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 361.306359][T19875] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 361.331002][T19875] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 40: padding at end of block bitmap is not set [ 361.348174][T19875] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 361.357363][T19875] EXT4-fs (loop3): 1 truncate cleaned up [ 361.363012][T19875] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 361.378750][T19875] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #16: comm syz-executor.3: corrupted xattr block 31: invalid header [ 361.392426][T19875] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop3 ino=16 [ 361.401715][T19875] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #16: comm syz-executor.3: corrupted xattr block 31: invalid header [ 361.415626][T19875] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop3 ino=16 [ 361.425211][T19875] EXT4-fs error (device loop3): ext4_get_link:106: inode #16: comm syz-executor.3: bad symlink. [ 361.429885][T19887] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #16: comm syz-executor.3: corrupted xattr block 31: invalid header [ 361.449380][T19887] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop3 ino=16 [ 361.458440][T19887] EXT4-fs error (device loop3): ext4_get_link:106: inode #16: comm syz-executor.3: bad symlink. [ 361.482726][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 362.301022][ T28] audit: type=1400 audit(2000000656.437:1179): avc: denied { ioctl } for pid=19936 comm="syz-executor.1" path="socket:[67977]" dev="sockfs" ino=67977 ioctlcmd=0x8924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 362.330881][T19939] loop4: detected capacity change from 0 to 256 [ 363.271629][T19983] loop3: detected capacity change from 0 to 256 [ 363.403480][T19995] loop3: detected capacity change from 0 to 512 [ 363.412452][T19995] EXT4-fs error (device loop3): ext4_clear_blocks:883: inode #13: comm syz-executor.3: attempt to clear invalid blocks 1 len 1 [ 363.426394][T19995] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 343: padding at end of block bitmap is not set [ 363.441537][T19995] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 363.450512][T19995] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 0) [ 363.465226][T19995] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 1) [ 363.480694][T19995] EXT4-fs (loop3): 1 truncate cleaned up [ 363.486390][T19995] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 363.505678][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 363.627904][T20010] tap0: tun_chr_ioctl cmd 1074025675 [ 363.633226][T20010] tap0: persist disabled [ 363.721082][T20014] loop3: detected capacity change from 0 to 512 [ 363.730042][T20014] EXT4-fs error (device loop3): ext4_clear_blocks:883: inode #13: comm syz-executor.3: attempt to clear invalid blocks 1 len 1 [ 363.744264][T20014] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 343: padding at end of block bitmap is not set [ 363.759326][T20014] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 363.769785][T20014] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 0) [ 363.784430][T20014] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 1) [ 363.799255][T20014] EXT4-fs (loop3): 1 truncate cleaned up [ 363.804917][T20014] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 363.828402][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 363.913584][T20019] syzkaller0: entered promiscuous mode [ 363.919122][T20019] syzkaller0: entered allmulticast mode [ 364.009499][T20025] tap0: tun_chr_ioctl cmd 1074025675 [ 364.014867][T20025] tap0: persist disabled [ 364.104915][T20044] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 364.119863][T20044] validate_nla: 2 callbacks suppressed [ 364.119876][T20044] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 364.198256][T20053] tap0: tun_chr_ioctl cmd 1074025675 [ 364.203620][T20053] tap0: persist disabled [ 364.445886][T20080] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 364.461784][T20080] loop1: detected capacity change from 0 to 2048 [ 364.476799][T20080] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 364.490447][ T28] audit: type=1326 audit(2000000658.627:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20079 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f390f679ea9 code=0x0 [ 365.282810][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 365.380655][T20171] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 365.413146][T20171] loop1: detected capacity change from 0 to 2048 [ 365.422359][T20176] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 365.437741][T20171] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 365.467421][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 365.467436][ T28] audit: type=1326 audit(2000000659.607:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20170 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f390f679ea9 code=0x0 [ 365.971048][T20202] loop3: detected capacity change from 0 to 512 [ 365.980807][T20202] EXT4-fs error (device loop3): ext4_clear_blocks:883: inode #13: comm syz-executor.3: attempt to clear invalid blocks 1 len 1 [ 365.994509][T20202] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 343: padding at end of block bitmap is not set [ 366.010463][T20202] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 366.019640][T20202] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 0) [ 366.034137][T20202] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 1) [ 366.048877][T20202] EXT4-fs (loop3): 1 truncate cleaned up [ 366.054541][T20202] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 366.074793][T18682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 366.224271][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 366.395244][T20241] loop1: detected capacity change from 0 to 512 [ 366.404592][T20241] EXT4-fs error (device loop1): ext4_clear_blocks:883: inode #13: comm syz-executor.1: attempt to clear invalid blocks 1 len 1 [ 366.418132][T20241] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz-executor.1: bg 0: block 343: padding at end of block bitmap is not set [ 366.433142][T20241] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6537: Corrupt filesystem [ 366.442190][T20241] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 366.457433][T20241] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 366.472168][T20241] EXT4-fs (loop1): 1 truncate cleaned up [ 366.478066][T20241] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 366.501388][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 366.682970][T20265] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 0, id = 0 [ 366.683064][T20264] IPVS: stopping master sync thread 20265 ... [ 367.104330][ T28] audit: type=1400 audit(2000000661.237:1183): avc: denied { map } for pid=20296 comm="syz-executor.1" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 367.238057][T20319] syzkaller0: entered promiscuous mode [ 367.243605][T20319] syzkaller0: entered allmulticast mode [ 367.313464][T20331] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 367.355061][T20335] loop1: detected capacity change from 0 to 1024 [ 367.364179][T20335] EXT4-fs: Ignoring removed nobh option [ 367.370595][T20335] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 367.383502][T20335] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 367.398807][T20335] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2250: inode #15: comm syz-executor.1: corrupted in-inode xattr: ea_inode specified without ea_inode feature enabled [ 367.422753][T15102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 367.654958][T20352] pim6reg1: entered promiscuous mode [ 367.660405][T20352] pim6reg1: entered allmulticast mode [ 367.756559][T20364] loop1: detected capacity change from 0 to 256 [ 367.775043][ T28] audit: type=1400 audit(2000000661.907:1184): avc: denied { mounton } for pid=20363 comm="syz-executor.1" path="/root/syzkaller-testdir2336598955/syzkaller.1pnGz5/428/file1/file0" dev="loop1" ino=40 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=dir permissive=1 [ 368.101359][T20383] loop1: detected capacity change from 0 to 256 [ 368.328697][T20404] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 368.330379][T20405] loop1: detected capacity change from 0 to 256