qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqsAMHAgAAAABA/q+NUFVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVYUdOBAAAAAAEORvvcIABQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAVQAAAP//WNztow==") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f00004ba000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0xffffff2a}}, './file0\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @dev}, 0x2}}, 0x2e) lseek(r3, 0x1, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000006c0), r2) syz_io_uring_setup(0x37, &(0x7f00000003c0)={0x0, 0x100000, 0x400, 0x10000001, 0xba, 0x0, r3}, &(0x7f0000000340), 0x0) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r10 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r9) r11 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4b, &(0x7f0000000240)=0x5, 0x4) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0810296ed0ab7abd7000ffdbdf250c0000002c00078008000100060000000c000300070000000000000008000100000000000c100300c50d0000"], 0x40}}, 0x4048000) recvmmsg(r11, &(0x7f0000000380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/19, 0x13}}], 0x1, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r10) [ 135.852971][ T7742] loop4: detected capacity change from 0 to 65536 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1810714, &(0x7f0000000340)={[{@journal_dev={'journal_dev', 0x3d, 0x9}}, {@noblock_validity}, {@usrquota}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@usrjquota, 0x5}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$eJzs281vVFUbAPDn3pkCL7zSioiCoFU0Nn60tKCycKPRxIUmJrrAZW0LqQzU0JoIabQag0tD4t64NPEvcOXKqCsTt7o3JEQbE9CNY+7MvW1nmCn9mDKV+f2SgXPmnrnnPD333DlzzkwAPWsw+yeJ+H9E/BIR/fVsY4HB+n83Fucn/lqcn0iiWn3j96RW7vri/ERRtHjdnjwzlEaknyR5JY1mL146O16pTF3I8yNz594dmb146enpc+Nnps5MnR87efLE8dHnnh17piNxZvFdP/TBzOGDr7x15bWJU1fe/uHrrL0HjtSPr4yjUwazwP+o1jQfe6zTlXXZP9XlOJNyt1vDWpUiIuuuvtr4749SLHdef7z8cVcbB2yp7J69s/3hhSpwB0ui2y0AuqN4o88+/xaP2zT12BauvVD/AJTFfSN/1I+UI83L9G1h/YMRcWrh7y+yRzStQ1RbrBsAAGzWt9n856lW8780DqwotzffGxqIiLsjYl9E3BMR+yPi3oha2fsi4v511t+8NXTz/DO9uqHA1iib/z2f7201zv+K2V8MlPLcXbX4+5LT05WpY/nfZCj6dmb50VYnL07x0s+ftat/5fwve2T1F3PB/CRXy00LdJPjc+OdmpRe+yjiULlV/MnSTkASEQcj4tD6Tr23SEw/8dXhdoVuHf8qOrDPVP0y4vF6/y9EU/yFZPX9yZFdUZk6NlJcFTf78afLr7erf1Pxd0DW/7sbr/+mEv1/Jiv3a2fXX8flXz9t+5myvMHrf0fyZm1Pd0f+3Pvjc3MXRiN2JK/W8g3Pjy2/tsgX5bP4h462Hv/78tdk8T8QEdlFfCQiHoyIh/K+ezgiHomIo6vE//2Lj77T7th26P/Jlve/pet/oLH/158onf3um3b1r+3+d6KWGsqfqd3/bqF9c3blJTZ6NQMAAMB/T1r7bnySDi+l03R4uP4d/v2xO63MzM49eXrmvfOT9e/QD0RfWqx09a9YDx1NFvIz1vNj+Vpxcfx4vm78eel/tfzwxExlssuxQ6/b02b8Z34rdbt1wJbzey3oXc3jP+1SO4Dbz/s/9C7jH3qX8Q+9q9X4/7Apby8A7kze/6F3Gf/Qu4x/6F3GP/Skzfyuf6sS5VV+vS+xXRKRbotmSLRIlDswurt8YwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiQfwMAAP//EgHx+Q==") r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145542, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000008180)={0x0, 0x0, 0x0, 0x3}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000001480), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001600)={&(0x7f00000014c0)={0x138, r3, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x1}, @DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xfb, 0xa9, @random="b017c5621c1f93b2d278ee83a64fd192fbdd1bf7d4cf9eeddb8eed5c794621adaaa4e35b96cc422834052760ba5104a92c00d3608e13e749c57ff9a89208c5f51f207024b0c85486e650b0c5f48c6f792bcf7d8e99457339534bd239a350033aae15f709a2ebee596a7e644386e55d0d7ff1cf9072b49b7156ee956c5516c28ad0179fbb35b2d5732228310f8380d88880d1b5f73f15247b7da53895c2eb46fca1bdafb6d981cff566b2f30eee7ec25566d92c269d22e0b1a82a313ecd36fdaa6d9a86c599a39ee50796ba9129e884565be465248b512144e644806dbdc1c98e6faecfe3c8bf937695fc6055f827f85fd7088edf508d4e"}, @handle=@pci={{0x8}, {0x11}}]}, 0x138}, 0x1, 0x0, 0x0, 0x4040050}, 0x4000000) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_io_uring_setup(0x2ddd, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x0, 0xfffffffe}, &(0x7f0000000240)=0x0, &(0x7f0000000380)) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file2\x00', 0x224000, &(0x7f0000000000)=ANY=[@ANYRES8=0x0, @ANYRESOCT=r4, @ANYRESDEC=0x0, @ANYRES16=r0], 0x1, 0x1205, &(0x7f00000001c0)="$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") prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 136.020562][ T7746] loop4: detected capacity change from 0 to 512 [ 136.029611][ T7746] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 136.038334][ T7746] EXT4-fs (loop4): 1 truncate cleaned up [ 136.043990][ T7746] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) bind$can_raw(r0, 0x0, 0x0) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 136.098442][ T3116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a3100000000"], 0xf8}}, 0x0) executing program 4: socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x8}, 0x48) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 136.181043][ T7754] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={{0x14}, [], {0x14, 0x10}}, 0x28}}, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) (async) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) sendto$inet6(r0, &(0x7f0000000100)="8f", 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @private2}, 0x1c) (async) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e20, 0x0, @private2}}}, 0x84) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x802, 0x0) (async) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x1, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {}, {}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) (async) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(0x0, r0) socket(0x2, 0x3, 0x4) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r1 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r1, 0x80081270, 0x3) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="a91c000000000000000100040008000300", @ANYRES32=r4, @ANYBLOB], 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000001000050400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000020000200012800b00010065727370616e000010000280040012000800150000001000"], 0x40}}, 0x0) r5 = socket(0x1, 0x1, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) r7 = dup(r6) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r8, &(0x7f0000000080), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000005, 0x10012, r8, 0x0) r9 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r9, &(0x7f0000000440), 0x10) listen(r9, 0x0) r10 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r10, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) r11 = accept4$unix(r9, 0x0, 0x0, 0x0) recvmsg(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1}, 0x0) close(r10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x75, &(0x7f0000000080), &(0x7f0000000040)=0x8) r12 = socket$unix(0x1, 0x1, 0x0) bind$unix(r12, &(0x7f0000003000)=@abs={0x1}, 0x6e) r13 = socket$unix(0x1, 0x1, 0x0) bind$unix(r13, &(0x7f0000003000)=@abs={0x1}, 0x4f) r14 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r14, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="39000000140081ae00002c000500015601618575e285af018000ffffffff00883795c04a31ba377a1b2cc32b38d3740000e10610edab05f7dd", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a3100000000"], 0xf8}}, 0x0) executing program 0: socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x8}, 0x48) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r1) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="1977000000000000000004"], 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2020480, &(0x7f0000001900), 0x1, 0x761, &(0x7f0000001180)="$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") executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r3, 0x0}]) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r3, 0x0}]) [ 136.341962][ T7773] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) bind$can_raw(r0, &(0x7f0000000080), 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0xe300) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a0101000000000000000007000000090002007379"], 0xf8}}, 0x0) [ 136.424686][ T7788] loop3: detected capacity change from 0 to 2048 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) chmod(0x0, 0xff1f755ad87f0000) executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="05ea996662c980172bea92aa93f4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r2, @ANYBLOB="0000000000000000b7080000ecffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRESOCT=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) r8 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r8, 0x127e, 0xffffffffffffffff) executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1810714, &(0x7f0000000340)={[{@journal_dev={'journal_dev', 0x3d, 0x9}}, {@noblock_validity}, {@usrquota}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@usrjquota, 0x5}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$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") r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145542, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000008180)={0x0, 0x0, 0x0, 0x3}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000001480), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001600)={&(0x7f00000014c0)={0x138, r3, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x1}, @DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xfb, 0xa9, @random="b017c5621c1f93b2d278ee83a64fd192fbdd1bf7d4cf9eeddb8eed5c794621adaaa4e35b96cc422834052760ba5104a92c00d3608e13e749c57ff9a89208c5f51f207024b0c85486e650b0c5f48c6f792bcf7d8e99457339534bd239a350033aae15f709a2ebee596a7e644386e55d0d7ff1cf9072b49b7156ee956c5516c28ad0179fbb35b2d5732228310f8380d88880d1b5f73f15247b7da53895c2eb46fca1bdafb6d981cff566b2f30eee7ec25566d92c269d22e0b1a82a313ecd36fdaa6d9a86c599a39ee50796ba9129e884565be465248b512144e644806dbdc1c98e6faecfe3c8bf937695fc6055f827f85fd7088edf508d4e"}, @handle=@pci={{0x8}, {0x11}}]}, 0x138}, 0x1, 0x0, 0x0, 0x4040050}, 0x4000000) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_io_uring_setup(0x2ddd, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x0, 0xfffffffe}, &(0x7f0000000240), &(0x7f0000000380)) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) [ 136.502100][ T7796] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.4'. [ 136.541937][ T7806] loop4: detected capacity change from 0 to 512 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x8}, 0x48) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioperm(0x0, 0x2, 0x2) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff}, 0x20) (async) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff}, 0x20) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22004002, &(0x7f0000000080), 0x84, 0x46c, &(0x7f00000004c0)="$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") r1 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000540)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x18}) (async) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x18}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) [ 136.550706][ T7806] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 136.560945][ T7806] EXT4-fs (loop4): 1 truncate cleaned up [ 136.566650][ T7806] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 136.589784][ T3116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) bind$can_raw(r0, &(0x7f0000000080), 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 136.642697][ T7813] loop4: detected capacity change from 0 to 512 [ 136.653432][ T7813] EXT4-fs warning (device loop4): ext4_block_to_path:107: block 3279945729 > max in inode 13 [ 136.663899][ T7813] EXT4-fs warning (device loop4): ext4_block_to_path:107: block 3279945730 > max in inode 13 [ 136.674906][ T7813] EXT4-fs (loop4): 1 truncate cleaned up [ 136.680554][ T7813] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 136.699886][ T3116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r3, 0x0}]) executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: ioperm(0x0, 0x8, 0x2) r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) shmctl$IPC_SET(0x0, 0xb, &(0x7f0000000080)={{0x1, 0x0, r1}, 0x0, 0x0, 0x0, 0x8000000000000001, 0x0, 0x0, 0x2}) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x0}]) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x4, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="66e6fa1035ed49f5c59d2d38cb6f1041387d0d41a970a37e12c63cd9009ecf37ef3df2f507a526341137476474c00aa654ab8398f48e97f93791a061177dffc9f46708d2dfcf9ce6824860a237eed7dce41877c3b29e37ee126b710b3da2fc19f6fafe78d9798129c53492743f2c05f4b56322dbfca5e96fb7967212b5550b67e894cb8ca77de3ab4e44c579738e15a5f8d104f36ba40f3d20b026d1679642ae48d31763da118292dcca4e8093f5eb1790f565c652d9531300268d04da497e03b37f42930f48e6dd695fa5e70d8bfd54d5b3d3da8f", @ANYRESHEX=r5, @ANYRES16, @ANYRES16], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x23, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000002400)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x3, 0xf, 0x1}, 0x10}, 0x90) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) setsockopt$sock_int(r8, 0x1, 0x21, &(0x7f0000000080), 0x4) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r3, 0x0}]) [ 137.130149][ T7837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=7837 comm=syz-executor.4 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000a000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0170000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000c9c001f08c2d5c6b00000000000a0000000900010073797a300000000060000000160a010400000000000000000a0000020900020073797a30000000000900010073797a300000000008000740000000012c0003800800014000000000080002400000000000000140000e0000140000001100010000000000000000000000000a"], 0xffffffffffffff24}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) r5 = socket(0x200000000000011, 0x2, 0x0) (rerun: 64) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r5, &(0x7f0000000180)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) (async, rerun: 64) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) (rerun: 64) getsockname$packet(r5, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x218}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000700)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3800000055000100000000000000000007008209", @ANYRES32=r7, @ANYBLOB="20000100", @ANYRES32=r10, @ANYBLOB="00001000e000030000010001000000000000000008"], 0x38}}, 0x0) (async) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f0000000440)={'pim6reg1\x00'}) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg$nl_route(r11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x0}]) executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1810714, &(0x7f0000000340)={[{@journal_dev={'journal_dev', 0x3d, 0x9}}, {@noblock_validity}, {@usrquota}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@usrjquota, 0x5}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$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") r1 = open(&(0x7f0000007f80)='./bus\x00', 0x145542, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000008180)={0x0, 0x0, 0x0, 0x3}) syz_genetlink_get_family_id$devlink(&(0x7f0000001480), 0xffffffffffffffff) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) [ 137.241401][ T7844] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 1: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000d0200aa1e1c170003003e000839a59434d90a2742a24e000000000000000000deef14b40028e27ebdfd74dafc20380003"], 0x3c) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r0, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r1 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000005280)) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r3, 0x0}]) [ 137.285579][ T7853] loop4: detected capacity change from 0 to 512 [ 137.294497][ T7853] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 137.302929][ T7853] EXT4-fs (loop4): 1 truncate cleaned up [ 137.308660][ T7853] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) [ 137.331813][ T3116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x0}]) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000056000000010008f6060000000000000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='rss_stat\x00', r0}, 0x10) syz_open_dev$sg(&(0x7f00000001c0), 0x300000000000000, 0x0) executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r0, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r1 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000005280)) executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="05ea996662c980172bea92aa93f4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r2, @ANYBLOB="0000000000000000b7080000ecffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRESOCT=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x127e, 0xffffffffffffffff) executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0x300) executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r0, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r1 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000005280)) executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044"], 0xf8}}, 0x0) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, 0x0, 0x0) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 137.552038][ T7897] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 137.561410][ T7897] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0x1000000) executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, 0x0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000005280)) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newqdisc={0x44, 0x24, 0x0, 0x0, 0x0, {}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_NAT={0x8}, @TCA_CAKE_TARGET={0x8}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="67a9fde500000001280012800a00010076786c616e"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ftruncate(r0, 0xc17a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044"], 0xf8}}, 0x0) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) [ 137.670740][ T7915] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 137.680103][ T7915] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1810714, &(0x7f0000000340)={[{@journal_dev={'journal_dev', 0x3d, 0x9}}, {@noblock_validity}, {@usrquota}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@usrjquota, 0x5}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$eJzs281vVFUbAPDn3pkCL7zSioiCoFU0Nn60tKCycKPRxIUmJrrAZW0LqQzU0JoIabQag0tD4t64NPEvcOXKqCsTt7o3JEQbE9CNY+7MvW1nmCn9mDKV+f2SgXPmnrnnPD333DlzzkwAPWsw+yeJ+H9E/BIR/fVsY4HB+n83Fucn/lqcn0iiWn3j96RW7vri/ERRtHjdnjwzlEaknyR5JY1mL146O16pTF3I8yNz594dmb146enpc+Nnps5MnR87efLE8dHnnh17piNxZvFdP/TBzOGDr7x15bWJU1fe/uHrrL0HjtSPr4yjUwazwP+o1jQfe6zTlXXZP9XlOJNyt1vDWpUiIuuuvtr4749SLHdef7z8cVcbB2yp7J69s/3hhSpwB0ui2y0AuqN4o88+/xaP2zT12BauvVD/AJTFfSN/1I+UI83L9G1h/YMRcWrh7y+yRzStQ1RbrBsAAGzWt9n856lW8780DqwotzffGxqIiLsjYl9E3BMR+yPi3oha2fsi4v511t+8NXTz/DO9uqHA1iib/z2f7201zv+K2V8MlPLcXbX4+5LT05WpY/nfZCj6dmb50VYnL07x0s+ftat/5fwve2T1F3PB/CRXy00LdJPjc+OdmpRe+yjiULlV/MnSTkASEQcj4tD6Tr23SEw/8dXhdoVuHf8qOrDPVP0y4vF6/y9EU/yFZPX9yZFdUZk6NlJcFTf78afLr7erf1Pxd0DW/7sbr/+mEv1/Jiv3a2fXX8flXz9t+5myvMHrf0fyZm1Pd0f+3Pvjc3MXRiN2JK/W8g3Pjy2/tsgX5bP4h462Hv/78tdk8T8QEdlFfCQiHoyIh/K+ezgiHomIo6vE//2Lj77T7th26P/Jlve/pet/oLH/158onf3um3b1r+3+d6KWGsqfqd3/bqF9c3blJTZ6NQMAAMB/T1r7bnySDi+l03R4uP4d/v2xO63MzM49eXrmvfOT9e/QD0RfWqx09a9YDx1NFvIz1vNj+Vpxcfx4vm78eel/tfzwxExlssuxQ6/b02b8Z34rdbt1wJbzey3oXc3jP+1SO4Dbz/s/9C7jH3qX8Q+9q9X4/7Apby8A7kze/6F3Gf/Qu4x/6F3GP/Skzfyuf6sS5VV+vS+xXRKRbotmSLRIlDswurt8YwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiQfwMAAP//EgHx+Q==") r1 = open(&(0x7f0000007f80)='./bus\x00', 0x145542, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000008180)={0x0, 0x0, 0x0, 0x3}) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) [ 137.742158][ T7925] loop3: detected capacity change from 0 to 512 [ 137.751058][ T7925] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 137.759453][ T7925] EXT4-fs (loop3): 1 truncate cleaned up [ 137.765114][ T7925] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 137.787076][ T7183] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r3, 0x0}]) executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a300000000048000380440000800800034000000002"], 0xf8}}, 0x0) [ 137.993756][ T7934] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 138.003106][ T7934] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x4, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="66e6fa1035ed49f5c59d2d38cb6f1041387d0d41a970a37e12c63cd9009ecf37ef3df2f507a526341137476474c00aa654ab8398f48e97f93791a061177dffc9f46708d2dfcf9ce6824860a237eed7dce41877c3b29e37ee126b710b3da2fc19f6fafe78d9798129c53492743f2c05f4b56322dbfca5e96fb7967212b5550b67e894cb8ca77de3ab4e44c579738e15a5f8d104f36ba40f3d20b026d1679642ae48d31763da118292dcca4e8093f5eb1790f565c652d9531300268d04da497e03b37f42930f48e6dd695fa5e70d8bfd54d5b3d3da8f", @ANYRESHEX=r5, @ANYRES16, @ANYRES16], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x23, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000002400)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x3, 0xf, 0x1}, 0x10}, 0x90) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) setsockopt$sock_int(r8, 0x1, 0x21, &(0x7f0000000080), 0x4) executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1810714, &(0x7f0000000340)={[{@journal_dev={'journal_dev', 0x3d, 0x9}}, {@noblock_validity}, {@usrquota}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@usrjquota, 0x5}, {@min_batch_time={'min_batch_time', 0x3d, 0xa9f}}, {@nodiscard}]}, 0xff, 0x451, &(0x7f0000000d00)="$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") capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) [ 138.222870][ T7947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=7947 comm=syz-executor.1 [ 138.260546][ T7951] loop2: detected capacity change from 0 to 512 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, 0x0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000005280)) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, 0x0, 0x0) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 138.269587][ T7951] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 138.271044][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 138.289043][ T7951] EXT4-fs (loop2): 1 truncate cleaned up [ 138.294787][ T7951] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 138.318190][ T6862] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 138.331253][ T10] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.358713][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.365846][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.373071][ T7937] bridge_slave_0: entered allmulticast mode [ 138.379587][ T7937] bridge_slave_0: entered promiscuous mode [ 138.387360][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.394468][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.401616][ T7937] bridge_slave_1: entered allmulticast mode [ 138.408188][ T7937] bridge_slave_1: entered promiscuous mode executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 138.417702][ T10] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x4, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="66e6fa1035ed49f5c59d2d38cb6f1041387d0d41a970a37e12c63cd9009ecf37ef3df2f507a526341137476474c00aa654ab8398f48e97f93791a061177dffc9f46708d2dfcf9ce6824860a237eed7dce41877c3b29e37ee126b710b3da2fc19f6fafe78d9798129c53492743f2c05f4b56322dbfca5e96fb7967212b5550b67e894cb8ca77de3ab4e44c579738e15a5f8d104f36ba40f3d20b026d1679642ae48d31763da118292dcca4e8093f5eb1790f565c652d9531300268d04da497e03b37f42930f48e6dd695fa5e70d8bfd54d5b3d3da8f", @ANYRESHEX=r5, @ANYRES16, @ANYRES16], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x23, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000002400)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x3, 0xf, 0x1}, 0x10}, 0x90) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) setsockopt$sock_int(r8, 0x1, 0x21, &(0x7f0000000080), 0x4) [ 138.444141][ T7937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 138.455948][ T7937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.470806][ T10] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x2, 0x0) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 2: r0 = memfd_create(0x0, 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, 0x0, 0x6000, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="05ea996662c980172bea92aa93f4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r2, @ANYBLOB="0000000000000000b7080000ecffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRESOCT=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x127e, 0xffffffffffffffff) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 138.484171][ T7970] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=7970 comm=syz-executor.2 [ 138.505897][ T7937] team0: Port device team_slave_0 added [ 138.512401][ T7937] team0: Port device team_slave_1 added executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r1 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r1, 0x80047453, &(0x7f0000005280)) [ 138.556464][ T10] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.573649][ T7937] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 138.580725][ T7937] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 138.606701][ T7937] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 138.624229][ T7937] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 138.631209][ T7937] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x4, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="66e6fa1035ed49f5c59d2d38cb6f1041387d0d41a970a37e12c63cd9009ecf37ef3df2f507a526341137476474c00aa654ab8398f48e97f93791a061177dffc9f46708d2dfcf9ce6824860a237eed7dce41877c3b29e37ee126b710b3da2fc19f6fafe78d9798129c53492743f2c05f4b56322dbfca5e96fb7967212b5550b67e894cb8ca77de3ab4e44c579738e15a5f8d104f36ba40f3d20b026d1679642ae48d31763da118292dcca4e8093f5eb1790f565c652d9531300268d04da497e03b37f42930f48e6dd695fa5e70d8bfd54d5b3d3da8f", @ANYRESHEX=r5, @ANYRES16, @ANYRES16], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x23, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000002400)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x3, 0xf, 0x1}, 0x10}, 0x90) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) setsockopt$sock_int(r8, 0x1, 0x21, &(0x7f0000000080), 0x4) executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) [ 138.657172][ T7937] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 138.682931][ T7987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=7987 comm=syz-executor.4 [ 138.698812][ T7937] hsr_slave_0: entered promiscuous mode executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0x2000000) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[0x0, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) [ 138.705756][ T7937] hsr_slave_1: entered promiscuous mode [ 138.714311][ T7937] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 138.721883][ T7937] Cannot create hsr debugfs directory executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b803400"], 0xf8}}, 0x0) [ 138.763344][ T10] bridge_slave_1: left allmulticast mode [ 138.769043][ T10] bridge_slave_1: left promiscuous mode [ 138.774740][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.782494][ T10] bridge_slave_0: left allmulticast mode [ 138.788154][ T10] bridge_slave_0: left promiscuous mode [ 138.793815][ T10] bridge0: port 1(bridge_slave_0) entered disabled state executing program 2: r0 = memfd_create(0x0, 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) [ 138.850773][ T8002] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 138.860191][ T8002] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 138.886869][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a320000000050b0305b6a7ae8f0de000000000000000000000008000b400000000028000480240001800b00010072656a656374000014000280050002000400000005000200000000000900010073797a3000000000140000001100010000000000000000000000000a"], 0xc4}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/fscreate\x00') writev(r1, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000440)="8e", 0x1}], 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000240), &(0x7f0000000340)=0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000280)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x88}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@usrquota}, {@data_err_abort}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000001200)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fchown(r3, 0x0, 0xee01) r4 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000400)={@empty}, 0x14) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lchown(&(0x7f0000000040)='./file0\x00', r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000000c0)=0x1) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "fe94b89fc43c3328eae0cae1f5eba329e6f216"}) splice(r7, 0x0, r6, 0x0, 0x7ffff000, 0x0) setreuid(r2, r5) [ 138.898687][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 138.909155][ T10] bond0 (unregistering): Released all slaves [ 138.935551][ T8009] SELinux: Context Ž is not valid (left unmapped). executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 138.947370][ T8009] loop2: detected capacity change from 0 to 1024 [ 138.957290][ T8009] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 138.982109][ T6862] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 138.997684][ T10] hsr_slave_0: left promiscuous mode [ 139.005719][ T10] hsr_slave_1: left promiscuous mode [ 139.011618][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 139.019072][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 139.028216][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 139.035695][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 139.044557][ T10] veth1_macvtap: left promiscuous mode executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x108) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="fec210ef11b7180000000000000000000000000000009500000000000000e2ec2d1a358d0450b5185455bbe39a5b76514e586528a0fa0d830ff4dcfdc8eb6c3218e937f521fbfd5d7da9fa0c5c77b5cd4f26d3f6a645fe0c3c836a4e4b5f3e550c84e32a3ce3f30e224fae87a25f9de6c7275ed7e197fe7d211fcb0188"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x10022) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000180)=0x1007e, 0x11fb96e13838704f) r2 = fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000080000000000000000000000950000000000000002fbe972736c3adad2d8d8c54a88891aa0aa3a75b889afd4b79b"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x10013200, &(0x7f0000000380)="2812975049901c70b453d9472d2aead2352c3f5f397bbb34e7c4e23ddb56a37efbb0f71d909e2b513127665afc3bd9fbc55b60a5216d183c99e19b958a323356e9fabce785aed83a7cb9af4ca51a62342fab455586e80bcf95a33b3c8ce8e8d060b7db72ffe8951ac1db04ac29ad15e6df7faeeec54941dc11abde1db2b41f45bb4769a5b47da5c0e0ab", 0x8a, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000500)="ce007312a9fbd1ccab51ef54e5a2c36139c227962045c78c2288b142df46da211fb08e0579156e0f2b4e7b23c2cb8e2c163cc75941b9db22e4db59fe5f34f323fb6e265e4d15eaa2f95126a28fd71e20a35c3ff14178835df5f20707f7b44049a8b8a3c2d985ad520586f8584c987ee7aec95190512b62894071a16fb60e") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='tcp_cong_state_set\x00', r4}, 0x10) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x791a, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(r6, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x11901) move_mount(r7, &(0x7f0000000140)='.\x00', r3, &(0x7f0000000180)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) r8 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r8, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r9, &(0x7f0000000040)='.\x00', r8, &(0x7f0000000180)='./file0\x00', 0x202) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000001b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 139.050020][ T10] veth0_macvtap: left promiscuous mode [ 139.055495][ T10] veth1_vlan: left promiscuous mode [ 139.060696][ T10] veth0_vlan: left promiscuous mode executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 139.141138][ T10] team0 (unregistering): Port device team_slave_1 removed [ 139.151120][ T10] team0 (unregistering): Port device team_slave_0 removed executing program 2: socket$unix(0x1, 0x2, 0x0) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a320000000050b0305b6a7ae8f0de000000000000000000000008000b400000000028000480240001800b00010072656a656374000014000280050002000400000005000200000000000900010073797a3000000000140000001100010000000000000000000000000a"], 0xc4}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/fscreate\x00') writev(r1, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000440)="8e", 0x1}], 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000240), &(0x7f0000000340)=0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000280)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x88}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@usrquota}, {@data_err_abort}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000001200)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fchown(r3, 0x0, 0xee01) r4 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000400)={@empty}, 0x14) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lchown(&(0x7f0000000040)='./file0\x00', r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000000c0)=0x1) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "fe94b89fc43c3328eae0cae1f5eba329e6f216"}) splice(r7, 0x0, r6, 0x0, 0x7ffff000, 0x0) setreuid(r2, r5) executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[0x0, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 139.231523][ T8025] loop2: detected capacity change from 0 to 1024 [ 139.240679][ T8025] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 139.264754][ T6862] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b803400"], 0xf8}}, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) pipe(&(0x7f00000001c0)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newqdisc={0x44, 0x24, 0x0, 0x0, 0x0, {}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_NAT={0x8}, @TCA_CAKE_TARGET={0x8}]}}]}, 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="67a9fde500000001280012800a00010076786c616e"], 0x3}}, 0x0) ftruncate(r0, 0xc17a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r0 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) [ 139.417256][ T8032] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 139.426676][ T8032] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 139.449583][ T7937] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 139.459495][ T7937] netdevsim netdevsim3 netdevsim1: renamed from eth1 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 2: capset(0x0, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) [ 139.470028][ T7937] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 139.484758][ T7937] netdevsim netdevsim3 netdevsim3: renamed from eth3 executing program 2: memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 139.522445][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.541233][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.556436][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.563540][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0xfdfdffff) [ 139.587693][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.594781][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.611806][ T7937] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 139.622238][ T7937] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="05ea996662c980172bea92aa93f4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r2, @ANYBLOB="0000000000000000b7080000ecffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRESOCT=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200000000000000ff0800ed05000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x127e, 0xffffffffffffffff) [ 139.700854][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.762180][ T7937] veth0_vlan: entered promiscuous mode [ 139.772388][ T7937] veth1_vlan: entered promiscuous mode [ 139.784759][ T7937] veth0_macvtap: entered promiscuous mode [ 139.794101][ T7937] veth1_macvtap: entered promiscuous mode [ 139.803779][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 139.814247][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.824090][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 139.834702][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.844659][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 139.855168][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.865114][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 139.875592][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.886455][ T7937] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 139.896289][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 139.906770][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.916639][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 139.927073][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.936869][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 139.947285][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:Dd', 0x0) [ 139.957106][ T7937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 139.967574][ T7937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.978440][ T7937] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 139.986946][ T7937] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.995877][ T7937] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a"], 0xf8}}, 0x0) executing program 3: socket$pppoe(0x18, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@sysvgroups}, {@auto_da_alloc}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000), &(0x7f0000000980)=ANY=[], 0x2000, 0x0) [ 140.004770][ T7937] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 140.013482][ T7937] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 140.072078][ T8078] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 140.075094][ T8081] loop3: detected capacity change from 0 to 512 [ 140.081411][ T8078] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 140.090191][ T8081] EXT4-fs: Ignoring removed mblk_io_submit option [ 140.096951][ T8078] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r0 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x80081270, 0x3) executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x4, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="66e6fa1035ed49f5c59d2d38cb6f1041387d0d41a970a37e12c63cd9009ecf37ef3df2f507a526341137476474c00aa654ab8398f48e97f93791a061177dffc9f46708d2dfcf9ce6824860a237eed7dce41877c3b29e37ee126b710b3da2fc19f6fafe78d9798129c53492743f2c05f4b56322dbfca5e96fb7967212b5550b67e894cb8ca77de3ab4e44c579738e15a5f8d104f36ba40f3d20b026d1679642ae48d31763da118292dcca4e8093f5eb1790f565c652d9531300268d04da497e03b37f42930f48e6dd695fa5e70d8bfd54d5b3d3da8f", @ANYRESHEX=r5, @ANYRES16, @ANYRES16], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x23, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000002400)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x3, 0xf, 0x1}, 0x10}, 0x90) [ 140.113598][ T8081] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 140.124826][ T8081] EXT4-fs (loop3): 1 truncate cleaned up [ 140.130538][ T8081] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 4: capset(&(0x7f0000000100), &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 4: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x0) [ 140.165661][ T7937] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 140.176192][ T8086] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=8086 comm=syz-executor.4 [ 140.223207][ T28] kauditd_printk_skb: 178 callbacks suppressed [ 140.223220][ T28] audit: type=1326 audit(1713989549.191:7811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a"], 0xf8}}, 0x0) [ 140.255770][ T28] audit: type=1326 audit(1713989549.201:7812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 [ 140.279779][ T28] audit: type=1326 audit(1713989549.201:7813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 140.303956][ T28] audit: type=1326 audit(1713989549.201:7814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 [ 140.328098][ T28] audit: type=1326 audit(1713989549.201:7815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x4, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="66e6fa1035ed49f5c59d2d38cb6f1041387d0d41a970a37e12c63cd9009ecf37ef3df2f507a526341137476474c00aa654ab8398f48e97f93791a061177dffc9f46708d2dfcf9ce6824860a237eed7dce41877c3b29e37ee126b710b3da2fc19f6fafe78d9798129c53492743f2c05f4b56322dbfca5e96fb7967212b5550b67e894cb8ca77de3ab4e44c579738e15a5f8d104f36ba40f3d20b026d1679642ae48d31763da118292dcca4e8093f5eb1790f565c652d9531300268d04da497e03b37f42930f48e6dd695fa5e70d8bfd54d5b3d3da8f", @ANYRESHEX=r5, @ANYRES16, @ANYRES16], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x23, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000002400)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x3, 0xf, 0x1}, 0x10}, 0x90) [ 140.352183][ T28] audit: type=1326 audit(1713989549.201:7816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 [ 140.376070][ T28] audit: type=1326 audit(1713989549.201:7817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 [ 140.400073][ T28] audit: type=1326 audit(1713989549.201:7818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=133 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 [ 140.419821][ T8096] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 140.424050][ T28] audit: type=1326 audit(1713989549.201:7819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 executing program 0: capset(&(0x7f0000000100), &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000440)={'pim6reg1\x00'}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000014}, 0x100048c7) [ 140.457276][ T28] audit: type=1326 audit(1713989549.201:7820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8091 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e97a1ea9 code=0x7ffc0000 [ 140.486122][ T8106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=8106 comm=syz-executor.3 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x80081270, 0x3) executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: capset(&(0x7f0000000100)={0x20071026}, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a"], 0xf8}}, 0x0) executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x0, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x80081270, 0x3) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) [ 140.586495][ T8127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=8127 comm=syz-executor.4 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: capset(&(0x7f0000000100)={0x20071026}, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001f000000000008000100", @ANYRES32=0x0, @ANYRES8=r2], 0x1c}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x24}, {0x1d}, {0x6}]}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r2) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x11, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfefc) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x107, 0x13, 0x0, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a00"], 0xf8}}, 0x0) executing program 0: r0 = socket(0x11, 0x800000003, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x8000f28, 0x0) splice(r4, 0x0, r1, 0x0, 0x7f, 0xe) write(r2, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff00"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) setsockopt$inet6_udp_encap(r6, 0x11, 0x68, &(0x7f0000003a80)=0x4, 0x4) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000cd8000/0x4000)=nil, 0x2) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'gre0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x10, 0x1, 0xfffffffb, 0x50, {{0x13, 0x4, 0x3, 0x3d, 0x4c, 0x68, 0x0, 0x80, 0x2f, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0xf, 0x70, [@empty, @multicast2, @remote]}, @rr={0x7, 0xb, 0x4, [@dev={0xac, 0x14, 0x14, 0x42}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_prespec={0x44, 0x1c, 0x5d, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x1a}, 0x1000}, {@local, 0x10001}, {@empty, 0x3ff}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r8, 0x0, '\x00', r9}, 0x48) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f0000000400)=ANY=[@ANYBLOB='sys_immutable,utf8=1,iocharset=ascii,shortname=win95,showexec,uid=', @ANYRESHEX, @ANYBLOB="2c636865636b3d7374726963742c756e695f786c6174653d302c757466383d312c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6c6f7765722c726f6469722c726f6469722c636865636b3d7374726963746469722c71756965742c6572726f72733d72656d6f756e742d726f2c001fce747433e8bde9cd61abe4b3180011582107a7a590788063b9462e2e03f536514bb87bf283e3db8ca754c3885fec454b6592e2891b3fbac64c410b9c418cdce69f536ca4b4b97ba5c88551cfe79b045add67"], 0x6, 0x2c1, &(0x7f00000005c0)="$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") ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f00000003c0)={'bridge0\x00'}) ioctl$sock_SIOCBRDELBR(r10, 0x89a1, &(0x7f0000000080)='bridge0\x00') executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 140.693369][ T8147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=8147 comm=syz-executor.2 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0xff00) executing program 1: capset(&(0x7f0000000100)={0x20071026}, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) socket$netlink(0x10, 0x3, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46020000000d0200aa1e1c170003003e000839a59434d90a2742a24e000000000000000000deef14b40028e27ebdfd74dafc20380003"], 0x3c) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) (async) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x308800, 0x800}, 0x20) (async) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f00000003c0)=0x800, 0x4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'veth1_to_batadv\x00', 0x0}) (async) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) (async) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r5, &(0x7f00000001c0)={0x2c, 0x2, r7}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRESOCT=r2], 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) (async) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r9, 0x5403, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x9f, 0x0, "50e7ad0a9b7fb988a9a64d01be1ce69ec53161"}) (async, rerun: 64) ioctl$TIOCSTI(r9, 0x5412, &(0x7f0000000200)=0x50) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00'}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r10 = fsmount(0xffffffffffffffff, 0x0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', r7, 0x0, r10, 0x0, 0x0, 0xfffffffffffffea8, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r11}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) timerfd_create(0x0, 0x0) executing program 3: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 1: capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) socket$netlink(0x10, 0x3, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/ldiscs\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x5, 0x1) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x100000001) executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 1: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0xfffffdfd) executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="000000000087170040000064"], 0x34}}, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="340000001400b5b200000000000000000a00001f3fbfe00601cd7dc135c0d739946ffa486f3f410f96d301254a21d3d82d7161cc78de045c1404d797258ddabd98cde151f882391bf9ef31a7083719d7f87ba18f0c6f2d7c", @ANYRES32=r8, @ANYBLOB="080008001f526bae1400020000000000000000000000ffff00000000"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000001400b59500000000000000000a000000", @ANYBLOB="d1c9105ccb167f008d0f1800990ca8d49e02d878f6eafdf8baeb749ea3973f4a29e2a3856bb0cc7226597d78a64d6962aab3d7e2eafcb03315de2d225c004e5f26ab4a5727ae98a82f3c0b04c5", @ANYBLOB="0800080002006bae1400020000000000000000000000ffff"], 0x34}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="b400000000000000610000000000000095000000000000004cb529e11ef33e82a841b13dae106a66c9334c8f250fb702730efc7fd60e9f448b906fc40982426a663dcad2bb6f01c994b420ea4d844020d46d51b73153e23f7bbff9d497686f8c6d1ee1e89eb9d9a09fd6e0ef1cfb00000000000008002949bd03fc49b33fcdfaf6e60bfbe19326323d3fc0e54add2b77d51123000000000000000005be32"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x40, '\x00', 0x0, 0x0, r9}, 0x90) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e730000000000000000023d", @ANYRESHEX=r11, @ANYBLOB=',wfdno=', @ANYRESHEX=r10, @ANYBLOB=',\x00']) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000300)="e3b1ed39ac10d6da4ca5a755ba202149cfb4a5b960acabc0be0c70ff72bfb0e96439578147e0817949ba825461316a0e39c40cc4d3ac1c2eff7d5430c5426730fe5d12f970e22a61019b5097986ee426b7d56215e8f8123be26be053d654c3c5de4e7a870886e1de74b71eb5eb8500325841c9ecec1f1144e6d3693fc5ef2e3e0e", 0x81}], 0x1, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) gettid() timer_create(0x0, 0x0, &(0x7f00000000c0)) [ 141.003545][ T8156] loop0: detected capacity change from 0 to 256 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) [ 141.056900][ T8156] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.064044][ T8156] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.076246][ T8156] bridge_slave_1: left allmulticast mode [ 141.081907][ T8156] bridge_slave_1: left promiscuous mode [ 141.087628][ T8156] bridge0: port 2(bridge_slave_1) entered disabled state executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) socket$netlink(0x10, 0x3, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 141.103956][ T8156] bridge_slave_0: left allmulticast mode [ 141.109845][ T8156] bridge_slave_0: left promiscuous mode [ 141.115695][ T8156] bridge0: port 1(bridge_slave_0) entered disabled state executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/ldiscs\x00', 0x0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) (async, rerun: 64) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 64) socket$inet6(0xa, 0x5, 0x1) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x100000001) executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@noinit_itable}, {}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@acl}, {@debug}]}, 0xfc, 0x575, &(0x7f0000000940)="$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") fspick(0xffffffffffffff9c, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x880, 0x0) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000080)=0x1000, 0x4) dup(0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac002", 0x11, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='\'\x00\x00\x00!', 0x5, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 141.226682][ T8220] loop3: detected capacity change from 0 to 1024 [ 141.251546][ T8220] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=2042c118, mo2=0002] [ 141.264305][ T8220] System zones: 0-1, 3-12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) [ 141.279150][ T8220] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 2: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0x100000000000000) [ 141.324727][ T7937] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: r0 = io_uring_setup(0x148e, &(0x7f0000000000)={0x0, 0x40000000, 0x0, 0x0, 0x17b}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) prctl$PR_SET_SECUREBITS(0x1c, 0x2a) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000780)=""/208, 0xd0}], 0x0, 0x2}, 0x20) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000000)={0x2, 0x4e1e, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000080)={0x0, 0xfffffffffffffff7, 0x800}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)={[{@errors_remount}]}, 0x7, 0x540, &(0x7f0000000fc0)="$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") r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c000140000000000000000808000440000000010c00014000000000000080010c00024000000000000000090800034000000fba0c00024000000000010000000c0001400000000000000007"], 0xdc}}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/175, 0xaf) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r7, 0xfffff000) eventfd(0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000040)={{}, 0x2}, 0x10) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000002800), 0x0, 0x0) inotify_add_watch(r8, &(0x7f0000002b00)='./file0\x00', 0x100) r9 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000d03) inotify_rm_watch(r8, r9) inotify_rm_watch(0xffffffffffffffff, r9) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a519908e8", 0x28}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 141.426885][ T8245] loop3: detected capacity change from 0 to 512 [ 141.445885][ T8245] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 141.459377][ T8245] ext4 filesystem being mounted at /root/syzkaller-testdir2582465246/syzkaller.gmsw89/17/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 141.476581][ T8245] EXT4-fs error (device loop3): ext4_do_update_inode:5082: inode #2: comm syz-executor.3: corrupted inode contents [ 141.488925][ T8245] EXT4-fs (loop3): Remounting filesystem read-only executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0), 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x6000, 0x4) executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="000000000087170040000064"], 0x34}}, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="340000001400b5b200000000000000000a00001f3fbfe00601cd7dc135c0d739946ffa486f3f410f96d301254a21d3d82d7161cc78de045c1404d797258ddabd98cde151f882391bf9ef31a7083719d7f87ba18f0c6f2d7c", @ANYRES32=r8, @ANYBLOB="080008001f526bae1400020000000000000000000000ffff00000000"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000001400b59500000000000000000a000000", @ANYBLOB="d1c9105ccb167f008d0f1800990ca8d49e02d878f6eafdf8baeb749ea3973f4a29e2a3856bb0cc7226597d78a64d6962aab3d7e2eafcb03315de2d225c004e5f26ab4a5727ae98a82f3c0b04c5", @ANYBLOB="0800080002006bae1400020000000000000000000000ffff"], 0x34}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="b400000000000000610000000000000095000000000000004cb529e11ef33e82a841b13dae106a66c9334c8f250fb702730efc7fd60e9f448b906fc40982426a663dcad2bb6f01c994b420ea4d844020d46d51b73153e23f7bbff9d497686f8c6d1ee1e89eb9d9a09fd6e0ef1cfb00000000000008002949bd03fc49b33fcdfaf6e60bfbe19326323d3fc0e54add2b77d51123000000000000000005be32"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x40, '\x00', 0x0, 0x0, r9}, 0x90) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e730000000000000000023d", @ANYRESHEX=r11, @ANYBLOB=',wfdno=', @ANYRESHEX=r10, @ANYBLOB=',\x00']) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000300)="e3b1ed39ac10d6da4ca5a755ba202149cfb4a5b960acabc0be0c70ff72bfb0e96439578147e0817949ba825461316a0e39c40cc4d3ac1c2eff7d5430c5426730fe5d12f970e22a61019b5097986ee426b7d56215e8f8123be26be053d654c3c5de4e7a870886e1de74b71eb5eb8500325841c9ecec1f1144e6d3693fc5ef2e3e0e", 0x81}], 0x1, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) gettid() timer_create(0x0, 0x0, &(0x7f00000000c0)) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) [ 141.672821][ T8256] sctp: [Deprecated]: syz-executor.1 (pid 8256) Use of int in max_burst socket option deprecated. [ 141.672821][ T8256] Use struct sctp_assoc_value instead executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f00)=@ipv4_newroute={0x4c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_ENCAP={0x28, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xfffffffffffffe26, 0x1, {{}, [@mcast1]}}}]}, 0x4c}}, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700030001000000000000000500080002000000", 0x24) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000009e569bffffffff000000000000850000006d"], &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) syz_clone3(&(0x7f0000000380)={0x110024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x1000000) executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x541b, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0x300001a, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES8=0x0], 0x0, 0x2a8, &(0x7f0000000580)="$eJzs3c1qA1UUAOAzSZpGXSSIG0VwQBeuSuvWTaNUELtSIqgbg21BklJoIWAFa1d9Apfia/gIrn0Dwa3grl1URiYz0yQ2qbG/YL8PSi9z77lzck9IVjnz5ev7g52DJE7Pf4tWK4naZmzGRRKdqEXl+2gEAPD/cZFl8WdWjJPybzmN2sNlBQA8pOL7v/DUuQAAj+OTzz7/qLu9vfVxmrbi1fbZqJdExP7ZqFfMd/fi6xjGbqxHOy4jsivF+IMPt7eikeY68db+yag3mtm/+0fEOH4j2tGZH7+RFsr4XkT+fyVejDS6eyvVVu14ZX78O3Pio9eMt9+cyn8t2vHrV3EQw9iJPHYS/91Gmr6f/XD+7Rf5bfL4pBa91fG6iaz+OBUBAAAAAAAAAAAAAAAAAAAAAOA5WEvTpGjfM+7fk18q++/UL8fza2mlM9ufp4i/6hdc9AfKomzRc5LFj1V/nfU0TbNy4SS+Ea81PFgAAAAAAAAAAAAAAAAAAAAAckffHA/6w+Hu4Z0H9UF/WHUDqH7Wf9sNN6euvBHHg3598Yary99ruttAnuuNi6PRiHs4lmUGL+T5LFjzU5nvf995dVLcT8vwqjD3+ipefu8qw7Scqg550E/+7V6tqnA/T08147b5jGs73D3Mxm+Jy2y2pq0Fh9m8p9NovjR36q8sy5bb593fixqVV5Jxi43l7r5SDha+W1rXa/HL4g0XfmTU7/qZAwAAAAAAAAAAAAAAAAAAzDf7w+l/OL0xtPZgSQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAI5s8/78atCJi9sq1wUkZfNOactCMw6MnfokAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8A38HAAD//xorSR0=") r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) fsync(r1) lchown(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) fsync(r2) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="50023974c3433e5900000077d769ad", @ANYRES16=r3, @ANYBLOB="06012abd7000fedbdf250f00000005002f00000000000a000900ffffffffffff0000080039000000000008000600", @ANYRES32=0x0, @ANYBLOB="080039001d00000005003300000000000500380000000000"], 0x50}, 0x1, 0x0, 0x0, 0x85}, 0x6000044) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x400}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001c40)=@filter={'filter\x00', 0xe, 0x4, 0x440, 0xffffffff, 0x230, 0x0, 0x230, 0xffffffff, 0xffffffff, 0x370, 0x370, 0x370, 0xffffffff, 0x4, &(0x7f0000000400), {[{{@uncond, 0x0, 0x120, 0x160, 0x0, {}, [@common=@srh={{0x30}, {0x8, 0x9, 0x5, 0x1, 0x1, 0x0, 0x1901}}, @common=@hbh={{0x48}, {0x7, 0x5, 0x1, [0x2, 0x0, 0x3, 0x800, 0x0, 0x1fc, 0xfffb, 0x0, 0x8001, 0x0, 0x2, 0x5, 0x4, 0x8, 0x5, 0x5], 0xc}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x1, "ec162215630e689f18d4ea71cefb95d4f18d397ff17b4656b2827e9d0486"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x4}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@mh={{0x28}, {"1da6"}}, @common=@dst={{0x48}, {0x2, 0x0, 0x1, [0x2, 0x0, 0x5, 0x8, 0x2, 0x1, 0x80, 0x1, 0x1400, 0x101, 0xfff9, 0x4, 0xf519, 0x7fff, 0x0, 0x7], 0x4}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=""/4096}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r6, {0x8}}, './file0\x00'}) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r8, 0x3a, 0x0, 0x0, 0x0) setuid(r7) sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000005fbf6fc3000000000002410000001000137564703a73797a3100000000"], 0x2c}}, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) r9 = fcntl$getown(r0, 0x9) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r9, 0x0, 0x4004) executing program 1: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, &(0x7f0000005280)) executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="05ea996662c980172bea92aa93f4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r2, @ANYBLOB="0000000000000000b7080000ecffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRESOCT=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) socket$key(0xf, 0x3, 0x2) r8 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r8, 0x127e, 0xffffffffffffffff) executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, 0x0, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f00)=@ipv4_newroute={0x4c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_ENCAP={0x28, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xfffffffffffffe26, 0x1, {{}, [@mcast1]}}}]}, 0x4c}}, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700030001000000000000000500080002000000", 0x24) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000009e569bffffffff000000000000850000006d"], &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) syz_clone3(&(0x7f0000000380)={0x110024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) [ 141.844018][ T8279] loop2: detected capacity change from 0 to 256 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r6, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r6, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) executing program 1: setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000000)=0x9, 0x4) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000000c0)={0x16fa, {{0xa, 0x4e21, 0x7fff, @loopback, 0x4}}, {{0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}}}, 0x108) r1 = fsmount(0xffffffffffffffff, 0x0, 0x79) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x100, r2, 0x430, 0x70bd29, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x16, 0x4}, {0x5}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0x563f}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x986}, {0x6, 0x16, 0x3ff}, {0x5}, {0x6, 0x11, 0xffff}, {0x8, 0xb, 0x9cf}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x8a}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x8138}, {0x8, 0xb, 0xffffffff}}]}, 0x100}, 0x1, 0x0, 0x0, 0xc884}, 0x20000000) bind$inet6(r0, &(0x7f0000000400)={0xa, 0x4e24, 0x606d, @local, 0x6}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000580)={'gre0\x00', &(0x7f0000000480)={'erspan0\x00', 0x0, 0x1, 0x7, 0x6, 0xaa, {{0x2d, 0x4, 0x2, 0x4, 0xb4, 0x68, 0x0, 0x49, 0x2f, 0x0, @multicast1, @empty, {[@timestamp_addr={0x44, 0x14, 0x1b, 0x1, 0xf, [{@broadcast, 0x6}, {@loopback, 0xffff}]}, @lsrr={0x83, 0x7, 0xa3, [@loopback]}, @end, @ra={0x94, 0x4}, @rr={0x7, 0x27, 0x64, [@multicast1, @loopback, @multicast2, @loopback, @private=0xa010100, @rand_addr=0x64010101, @rand_addr=0x64010100, @local, @local]}, @timestamp_prespec={0x44, 0x14, 0xa8, 0x3, 0x1, [{@rand_addr=0x64010100, 0x3f}, {@loopback, 0x3}]}, @generic={0x88, 0x11, "53b2242da5747bdb34f7b292dd8f2c"}, @end, @generic={0x89, 0x7, "9b6682ef01"}, @rr={0x7, 0x2b, 0xe, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x26}, @remote, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101, @rand_addr=0x64010100]}]}}}}}) sendmsg$nl_route_sched(r1, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@gettclass={0x24, 0x2a, 0x2, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x10, 0x8}, {0x5, 0x6}, {0xfff2}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x4c, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0xc084) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000007c0)={0x0, 0x1}, &(0x7f0000000800)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000840)={r5, @in={{0x2, 0x4e24, @loopback}}, 0x0, 0x6, 0x3c09, 0x7fff, 0x80, 0x4, 0x3}, 0x9c) socket$packet(0x11, 0x2, 0x300) r6 = accept4$x25(r1, &(0x7f0000000900), &(0x7f0000000940)=0x12, 0x80000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8982, &(0x7f0000000980)={0x6, 'wg2\x00', {0xbb}, 0xc924}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000009c0)={r5, 0x1, 0x30}, 0xc) pipe2$9p(&(0x7f0000000a00), 0x80) bind(r6, &(0x7f0000000a40)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x8b, 0x8, "e708e761b5651d68b68d6358048881e6ce905843245b6568f695cde2dd03cb008fb3d501494ed8615259a69ecf728e696801502fb1dab6dffe3258216e2122", 0x4}, 0x80) bind$netlink(r3, &(0x7f0000000ac0)={0x10, 0x0, 0x25dfdbff, 0x400}, 0xc) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000b00)) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000b40)=0x1104002, 0x4) sendmsg$key(r1, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000b80)={0x2, 0x18, 0xe1, 0x6, 0x41, 0x0, 0x70bd25, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x4, 0x7, 0x400, 0x0, 0x5}, @sadb_x_policy={0x8, 0x12, 0x4, 0x3, 0x0, 0x6e6bb6, 0xe1, {0x6, 0x3c, 0xe5, 0x2, 0x0, 0x3, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x10}, @in=@dev={0xac, 0x14, 0x14, 0xf}}}, @sadb_sa={0x2, 0x1, 0x4d5, 0x40, 0x0, 0x42, 0x0, 0x20000000}, @sadb_key={0x17, 0x8, 0x568, 0x0, "20c04be4a2fa714fcf355a679d381ddc455c4be553a84d0b6ea3a8c11d4e6a45ee259a610f76d0625ebc34e308364e84279b11e3d45dc962145672ccedb0d3b08a2b0f0fd7d4adb2cdeaef08ffc41ddaf78ea197abc2d777a05360eeea60d946ce00eec9ac802e7eae72de0b8df28604d2596d97b5bb34008cdef66a799fb54c82e4690ae6b7bf2a011578a5043e525a9119e7d53ef8cc706d568b9e754dcd150a5d0ca6c0809a1b55655bb384"}, @sadb_address={0x3, 0x7, 0x6c, 0x80, 0x0, @in={0x2, 0x4e21, @multicast2}}, @sadb_x_nat_t_type={0x1}, @sadb_x_sec_ctx={0xd, 0x18, 0x2, 0x80, 0x5c, "861ece79fa5916bce9e133f1104d027074d8bc11a920ab8a58dc9bf620b52b4196c57144b54359fb8c68fd531b83fa78126fe2453aca74eacbaae2d3043453c31d2b9c76e0cdde31b4e3009030ca0910b7b21c4c23f2f09bf1c24cd1"}, @sadb_sa={0x2, 0x1, 0x4d5, 0xe3, 0x54, 0xaf, 0x2, 0x60000000}, @sadb_ident={0x2, 0xb, 0x2, 0x0, 0x37da}, @sadb_x_filter={0x5, 0x1a, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@local, 0x6, 0x10, 0x10}]}, 0x208}}, 0x40) bind$inet(r1, &(0x7f0000000e40)={0x2, 0x4e22, @rand_addr=0x64010101}, 0x10) getsockname$inet6(r0, &(0x7f0000000e80)={0xa, 0x0, 0x0, @local}, &(0x7f0000000ec0)=0x1c) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x8, 0x2) ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000f80)='wlan0\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000fc0)={'syzkaller1\x00'}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000001000)={r5, 0xf2, "695c59b671749d25cd35ceb487a118dc135c708530ed739c4cab449527c09223cae8a084b91e0f3ca49341e693073b7fb7f9ce29b56990ef772d77bd07955cd9030a8d1c7cf1b8e19b9ad30929fa035e5656d1cb7b8419c70a82d02ad7e1e3bf65b1b1a9060b4715da918fc5d10c9d8c519e7aadd591741c0ace23f2e437551d010ee666834d07bd3356523a829eb214796470d96c0e301fbe23c3a267abb01e64d4eb86242f49780dd6d30fb76a5f9999ef4e3d5916eece3afbe26c73e6ecde9f07b96efb547d8b8eb8d7011b076240e0eb8364a1db084bfedaee0edfe2785b988100dd55b2cec0d2b409c8d00900dd9202"}, &(0x7f0000001100)=0xfa) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001140)={r7, 0xfffffff7, 0x1ff, 0x2, 0x0, 0x7, 0xf610, 0x0, {r5, @in={{0x2, 0x4e24, @broadcast}}, 0x8, 0x3f, 0x98, 0x5, 0x80}}, &(0x7f0000001200)=0xb0) executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, 0x0, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1262, 0x200000000000000) executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r6, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r6, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) getsockname(r4, &(0x7f0000000200)=@ax25={{0x3, @default}, [@default, @null, @rose, @null, @rose, @default]}, &(0x7f00000000c0)=0x80) bind$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r5, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x300) executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$inet6(0xa, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 142.256447][ T8307] chnl_net:caif_netlink_parms(): no params data found [ 142.263724][ T7937] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 142.273227][ T1721] EXT4-fs (loop3): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 142.291870][ T3737] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) [ 142.329463][ T8307] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.336590][ T8307] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.343745][ T8307] bridge_slave_0: entered allmulticast mode [ 142.352230][ T8307] bridge_slave_0: entered promiscuous mode [ 142.360244][ T8307] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.367325][ T8307] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80047453, &(0x7f0000005280)) [ 142.374575][ T8307] bridge_slave_1: entered allmulticast mode [ 142.380847][ T8307] bridge_slave_1: entered promiscuous mode [ 142.389791][ T3737] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 142.417489][ T8307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2800480, &(0x7f00000001c0), 0x1, 0x774, &(0x7f00000007c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100), 0xc, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xea, 0x0, &(0x7f0000000080)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)={0x49, 0x29, 0x0, {0x0, [{{0x4, 0x4, 0x2}, 0x4, 0x1, 0x7, './file0'}, {{0x20, 0x4}, 0x8000, 0x0, 0x7, './file0'}]}}, 0x49) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7f03) [ 142.427879][ T8307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.449475][ T3737] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 142.453989][ T8342] loop1: detected capacity change from 0 to 2048 [ 142.475446][ T8307] team0: Port device team_slave_0 added [ 142.482001][ T8307] team0: Port device team_slave_1 added [ 142.496775][ T8342] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 142.512078][ T8342] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1216: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r6, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r6, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) [ 142.512738][ T3737] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 142.527160][ T8342] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2 with error 28 [ 142.549257][ T8342] EXT4-fs (loop1): This should not happen!! Data will be lost [ 142.549257][ T8342] [ 142.558914][ T8342] EXT4-fs (loop1): Total free blocks count 0 [ 142.564903][ T8342] EXT4-fs (loop1): Free/Dirty block details [ 142.570790][ T8342] EXT4-fs (loop1): free_blocks=2415919104 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 142.576564][ T8342] EXT4-fs (loop1): dirty_blocks=32 [ 142.581677][ T8342] EXT4-fs (loop1): Block reservation details [ 142.587710][ T8342] EXT4-fs (loop1): i_reserved_data_blocks=2 [ 142.595507][ T8342] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 142.608049][ T8307] batman_adv: batadv0: Adding interface: batadv_slave_0 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) getsockname(r4, &(0x7f0000000200)=@ax25={{0x3, @default}, [@default, @null, @rose, @null, @rose, @default]}, &(0x7f00000000c0)=0x80) bind$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r5, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) [ 142.615082][ T8307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.641029][ T8307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 142.652362][ T8307] batman_adv: batadv0: Adding interface: batadv_slave_1 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x10b, 0x4, 0x0, &(0x7f0000048000), 0xfcffffff) pipe2(0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000), 0x0) exit(0x0) [ 142.659330][ T8307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.685287][ T8307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 142.715575][ T8307] hsr_slave_0: entered promiscuous mode [ 142.721998][ T8307] hsr_slave_1: entered promiscuous mode executing program 4: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x1000000) executing program 1: close(0xffffffffffffffff) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}]) executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, 0x0) [ 142.819513][ T3737] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 142.830350][ T3737] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 142.849017][ T3737] bond0 (unregistering): Released all slaves executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) getsockname(r4, &(0x7f0000000200)=@ax25={{0x3, @default}, [@default, @null, @rose, @null, @rose, @default]}, &(0x7f00000000c0)=0x80) bind$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r5, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f00)=@ipv4_newroute={0x4c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_ENCAP={0x28, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xfffffffffffffe26, 0x1, {{}, [@mcast1]}}}]}, 0x4c}}, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700030001000000000000000500080002000000", 0x24) syz_clone3(&(0x7f0000000380)={0x110024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) executing program 1: socket$inet_mptcp(0x2, 0x1, 0x106) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={0x0, 0x300, &(0x7f0000000180)={&(0x7f0000000340)={0x34, r0, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, 0x34}}, 0x0) executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x500) executing program 1: close(0xffffffffffffffff) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}]) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) [ 142.947323][ T3737] hsr_slave_0: left promiscuous mode [ 142.959943][ T3737] hsr_slave_1: left promiscuous mode [ 142.968998][ T3737] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 142.976435][ T3737] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 142.988176][ T3737] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 142.995608][ T3737] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 143.005719][ T3737] veth1_macvtap: left promiscuous mode [ 143.011340][ T3737] veth0_macvtap: left promiscuous mode [ 143.017013][ T3737] veth1_vlan: left promiscuous mode [ 143.022359][ T3737] veth0_vlan: left promiscuous mode [ 143.023176][ T8395] __nla_validate_parse: 36 callbacks suppressed [ 143.023188][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, 0x0) [ 143.043180][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 143.052464][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 143.070474][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 143.079826][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x6800, 0x4) [ 143.089118][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f00)=@ipv4_newroute={0x4c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_ENCAP={0x28, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xfffffffffffffe26, 0x1, {{}, [@mcast1]}}}]}, 0x4c}}, 0x0) syz_clone3(&(0x7f0000000380)={0x110024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) [ 143.123466][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 143.126590][ T8403] sctp: [Deprecated]: syz-executor.1 (pid 8403) Use of int in max_burst socket option deprecated. [ 143.126590][ T8403] Use struct sctp_assoc_value instead [ 143.132875][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 143.158002][ T8395] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 143.205367][ T3737] team0 (unregistering): Port device team_slave_1 removed [ 143.215722][ T3737] team0 (unregistering): Port device team_slave_0 removed executing program 4: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r1 = fcntl$dupfd(r0, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000300)={'wg1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r3, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) [ 143.251716][ T8407] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000003c000000890a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000011440000000c0a01080000000000000000010000000900820073797a32000000001800038014000080040001800400028008000340000000000900010073797a3000000000140000001000210000000000000000000000000a"], 0xc8}}, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000002200)={{0x0}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000526c0)={0x1a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "d30f30dd6d2240"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000600)={r10, r7, "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", "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"}) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x1, 0x103ba, 0x1}, 0x48) write(0xffffffffffffffff, &(0x7f0000000000)='$', 0x1) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000140)={r12, &(0x7f0000000000), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r12, &(0x7f0000000180), 0x0}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d5c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "6a55887d6e612d"}) r13 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r13, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) socket$nl_route(0x10, 0x3, 0x0) syz_clone3(&(0x7f0000000380)={0x110024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) [ 143.469187][ T8307] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 143.478211][ T8307] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 143.486897][ T8307] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 143.498463][ T8307] netdevsim netdevsim0 netdevsim3: renamed from eth3 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) [ 143.536613][ T8307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.551804][ T8307] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.574878][ T8] bridge0: port 1(bridge_slave_0) entered blocking state executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 3: r0 = timerfd_create(0x0, 0x0) read$eventfd(r0, &(0x7f0000001880), 0x8) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x1}, @jmp={0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0xffffffffffffffe1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x200000b, 0x12, r1, 0x0) ftruncate(r1, 0x8001) (async) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) [ 143.581985][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.599574][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.606667][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state executing program 4: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 2: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x480, &(0x7f00000000c0)=ANY=[], 0x1, 0x25d, &(0x7f0000000c00)="$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") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000003640)={'team_slave_1\x00', {0x2, 0x0, @empty}}) r1 = open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000e80)="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", &(0x7f0000000040)=""/23, 0x4}, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171c06000000000000001e14ef9cc093fce47d852720360100388e3dc177e9b496", "f28359738e229a4c668100000000000000e6bbc2ebce21aa45a7fea6180766bb"}) executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) socket$tipc(0x1e, 0x2, 0x0) getsockname(r4, &(0x7f0000000200)=@ax25={{0x3, @default}, [@default, @null, @rose, @null, @rose, @default]}, &(0x7f00000000c0)=0x80) bind$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 143.649591][ T8307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 143.660026][ T8307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.688406][ T8437] loop2: detected capacity change from 0 to 128 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x1000000) [ 143.751542][ T8307] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="de70c2501b60390f419ddcb4e7287bbdc4018c47de9521605d2a80381d55843f483eb25601767c31684ac7262d8fb5dcc5d3c195e2e7bee55c83d81f87ee3b4048e37ba5045b773999042eba67fcd0a14f7dd12ca9d97da4b9c7ecd4a8be72d0a4f91a2eb5ba16be1bcc89d2e581d400"/127, 0x7f}, {&(0x7f0000000100)="b914eecb980a88ba041534e03cddbb98c9931953b23519f567", 0x19}, {&(0x7f0000000140)="5b2119", 0x3}], 0x3}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}], 0x2, 0x0) executing program 3: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00'}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r5 = socket$kcm(0x10, 0x2, 0x4) r6 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r6, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r9 = socket$can_raw(0x1d, 0x3, 0x1) r10 = fcntl$dupfd(r9, 0x0, r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r10, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x600) executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeff0104000000fff5dd00000010000200040010000401400400000000", 0x58}], 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000900)=ANY=[@ANYBLOB="fc01000019000100000000000000000020010000000000000000000000000000fc02020000000000000000000000000010000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044010500ac1414aa000000000000000000000000000000003c00000000000000fc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c00000000000000e000000100000000000000000000000000000000000000000000000000000000000000007f000001000000000000000000000000000000006c00000000000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000ff010000000000000000000000000001000000003200000000000000000000000000000000000000000000000000000004", @ANYRESHEX, @ANYRESDEC=r0, @ANYBLOB="62dd79ec4b7302048630b02badb2d1228b902fcee16d37cf56819a3c0a6c947f5d3cf2a327198b477e5fdc6726588e35d910be32ed8ccb53aee58a21b3a5fdd02453e7262e082e7dc465ea7edf4d3793639c3c047385260990fd28cac3161298b09c1ec893bc5955291c2336f292540704e8ed", @ANYRESDEC=r0, @ANYRES64=r0], 0x1fc}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x3, 0x1, 0x301, 0x0, 0x0, {0x1, 0x0, 0x5}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_LABELS={0x14, 0x16, 0x1, 0x0, [0x8, 0xc65, 0x0, 0x3f]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000800}, 0x11) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x8, 0x10000, 0x3}, 0xc) executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) sendmmsg$inet(r6, &(0x7f0000002f80)=[{{&(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34}}], 0x18}}], 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 143.868070][ T8307] veth0_vlan: entered promiscuous mode [ 143.881702][ T8307] veth1_vlan: entered promiscuous mode executing program 2: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x10b, 0x4, 0x0, &(0x7f0000048000), 0xfffffffc) pipe2(0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000), 0x0) exit(0x0) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) [ 143.909012][ T8307] veth0_macvtap: entered promiscuous mode [ 143.921411][ T8307] veth1_macvtap: entered promiscuous mode [ 143.932132][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 143.942596][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.952450][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 143.962905][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.972694][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 143.983161][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.993053][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 1: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00'}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r5 = socket$kcm(0x10, 0x2, 0x4) r6 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r6, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r9 = socket$can_raw(0x1d, 0x3, 0x1) r10 = fcntl$dupfd(r9, 0x0, r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r10, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x1a0682) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x80, 0x1, 'client1\x00', 0xffffffff80000004, "c62e980da98279cf", "20e48560999fef32b6a5426180a8c27a00fce3fff0003336f794d20352346f8f"}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {0x1}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) open(0x0, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6254, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x15}, {0x6}]}, 0x10) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0b00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) [ 144.003485][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.015503][ T8307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 144.026871][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.037347][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.047212][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.057729][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.067574][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.078050][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.087869][ T8307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.098307][ T8307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x4000, 0x142, 0x13}, 0x18) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000000c0)) close(r0) clock_settime(0x3, &(0x7f0000000100)={0x0, 0x3938700}) recvmsg$unix(r1, &(0x7f0000000980)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/118, 0x76}, {&(0x7f0000000240)=""/28, 0x1c}, {&(0x7f0000000280)=""/132, 0x84}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/95, 0x5f}, {&(0x7f0000000480)=""/28, 0x1c}, {&(0x7f00000004c0)=""/210, 0xd2}, {&(0x7f00000005c0)=""/122, 0x7a}, {&(0x7f0000000640)=""/194, 0xc2}], 0x9, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x178}, 0x2001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r15 = semget(0x3, 0x1, 0x1) semtimedop(r15, &(0x7f00000009c0)=[{0x2, 0x6, 0x800}], 0x1, &(0x7f0000000a00)={0x77359400}) semop(0x0, &(0x7f0000000a40)=[{0x1, 0x200}, {0x3, 0x0, 0x1000}, {0x1, 0xe5ef}, {0x3, 0x4d6, 0x1000}, {0x4, 0xff, 0x800}, {0x1, 0xffff, 0x1800}, {0x2, 0x0, 0x1000}, {0x4, 0x6, 0x800}, {0xb0c6f55b30403e69, 0x1}, {0x2, 0x931}], 0xa) write$selinux_attr(r9, &(0x7f0000000a80)='system_u:object_r:apt_var_lib_t:s0\x00', 0x23) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000ac0)={{0x1, r11, r14, 0xee01, r2, 0x20, 0x4}, 0x3f, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4}) preadv2(r8, &(0x7f0000000c40)=[{&(0x7f0000000b40)=""/69, 0x45}, {&(0x7f0000000bc0)=""/34, 0x22}, {&(0x7f0000000c00)=""/52, 0x34}], 0x3, 0x0, 0x3, 0x4) ioctl$TIOCL_SELLOADLUT(r6, 0x541c, &(0x7f0000000c80)={0x5, 0x3, 0x8000, 0xfd, 0xfbe6}) r16 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000d00), r6) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r12, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x54, r16, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x7}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x93}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_NAN_MASTER_PREF={0x5}, @NL80211_ATTR_NAN_MASTER_PREF={0x5}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x5}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xc}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x40) sendmsg$NL80211_CMD_LEAVE_OCB(r13, &(0x7f0000000f00)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x28, r16, 0x10, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2008, 0x20}}}}, ["", "", "", ""]}, 0x28}}, 0x0) getpeername(r6, &(0x7f0000000f40)=@l2tp6={0xa, 0x0, 0x0, @dev}, &(0x7f0000000fc0)=0x80) semctl$IPC_STAT(r15, 0x0, 0x2, &(0x7f0000001000)=""/10) openat$cgroup_ro(r5, &(0x7f0000001040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r7, 0x4004f506, &(0x7f0000001080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000010c0)='./cgroup/syz0\x00', 0x1ff) geteuid() socket$inet(0x2, 0x4, 0x400000) fsetxattr$trusted_overlay_upper(r10, &(0x7f0000001100), &(0x7f0000001140)={0x0, 0xfb, 0x72, 0x1, 0x1, "2222a5e231ae60350b8db616aeb70b57", "9126e99e4b5a4512cf41a0b6b0de9f4dcc329bdcbd86a338fe2f7346f8d693db882ef79f611ab966c4e09d3478c49722fd49491bf6b326f31523535388aa4bc9ccc33cd4214b682d4d03f51d6fdd81581561632cb56fdae9e25b0f17e0"}, 0x72, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000001200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_KEY(r12, &(0x7f0000001300)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x74, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r17}, @void}}, [@NL80211_ATTR_KEY_SEQ={0xd, 0xa, "3f88caf1b08f2e0058"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "139cb135d8f67e6f6c9cadf7df"}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_KEY={0x24, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2f57103235"}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_MODE={0x5}]}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x8800}, 0x96c39c5fade40c28) epoll_create(0x8000) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000001340), &(0x7f0000001380)) mkdirat$cgroup(r1, &(0x7f00000013c0)='syz1\x00', 0x1ff) executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r1 = fcntl$dupfd(r0, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000300)={'wg1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r3, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) [ 144.109467][ T8307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.120116][ T8307] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.128912][ T8307] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.137687][ T8307] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.146431][ T8307] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r1 = fcntl$dupfd(r0, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000300)={'wg1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r3, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="05ea996662c980172bea92aa93f4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r2, @ANYBLOB="0000000000000000b7080000ecffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRESOCT=r5, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) r7 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x127e, 0xffffffffffffffff) executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000003c000000890a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000011440000000c0a01080000000000000000010000000900820073797a32000000001800038014000080040001800400028008000340000000000900010073797a3000000000140000001000210000000000000000000000000a"], 0xc8}}, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000002200)={{0x0}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000526c0)={0x1a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "d30f30dd6d2240"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000600)={r10, r7, "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", "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"}) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x1, 0x103ba, 0x1}, 0x48) write(0xffffffffffffffff, &(0x7f0000000000)='$', 0x1) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000140)={r12, &(0x7f0000000000), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r12, &(0x7f0000000180), 0x0}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d5c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "6a55887d6e612d"}) r13 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r13, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00'}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r5 = socket$kcm(0x10, 0x2, 0x4) r6 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r6, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r9 = socket$can_raw(0x1d, 0x3, 0x1) r10 = fcntl$dupfd(r9, 0x0, r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r10, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 1: r0 = timerfd_create(0x0, 0x0) read$eventfd(r0, &(0x7f0000001880), 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x200000b, 0x12, r1, 0x0) ftruncate(r1, 0x8001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x16, 0x9, &(0x7f0000000180)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x52, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) syz_open_dev$vcsu(&(0x7f0000000040), 0xa930, 0x171280) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@const={0x9, 0x0, 0x0, 0xa, 0x5}, @const={0x8, 0x0, 0x0, 0xa, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x7f}}]}, {0x0, [0x61, 0x61, 0x0, 0x61, 0x2e, 0x61, 0x0]}}, &(0x7f0000000300), 0x51, 0x0, 0x0, 0x1000}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$pptp(0x18, 0x1, 0x2) connect(r2, &(0x7f00000000c0)=@ieee802154={0x24, @long}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000850000000f00000095000000000000003667b5afb72fd798ef6a502b9fe86e38622b76ffeef5e021fa7a877ce7ca36df0bbb83fb135d7c9af615f653e82fb2d5d69f619b4ec11fcdc43cbcc76bbc68a6c3be833ef3f3225eaa36b6351fc5d44d2bfe2e1a67ed5bd5eb5b"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kvm_dirty_ring_reset\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000000c0), &(0x7f0000000240)=r3}, 0x20) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) socket$tipc(0x1e, 0x2, 0x0) getsockname(r4, &(0x7f0000000200)=@ax25={{0x3, @default}, [@default, @null, @rose, @null, @rose, @default]}, &(0x7f00000000c0)=0x80) bind$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 1: socket(0x10, 0x3, 0x0) syz_clone3(&(0x7f0000000380)={0x110024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x3000000) executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000003c000000890a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000011440000000c0a01080000000000000000010000000900820073797a32000000001800038014000080040001800400028008000340000000000900010073797a3000000000140000001000210000000000000000000000000a"], 0xc8}}, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000002200)={{0x0}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000526c0)={0x1a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x3, "d30f30dd6d2240"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000600)={r10, r7, "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", "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"}) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x1, 0x103ba, 0x1}, 0x48) write(0xffffffffffffffff, &(0x7f0000000000)='$', 0x1) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000140)={r12, &(0x7f0000000000), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r12, &(0x7f0000000180), 0x0}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d5c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "6a55887d6e612d"}) r13 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r13, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000440)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x57}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000280)={@private1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r8, 0x29, 0x1000000000021, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet6(r8, &(0x7f0000000180)={&(0x7f0000000340)={0xa, 0x4e25, 0x80000, @remote}, 0x1c, 0x0}, 0x20040051) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r7}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000280)={'tunl0\x00', 0x0, 0x80, 0x1, 0x5, 0x2, {{0x59, 0x4, 0x0, 0x1f, 0x164, 0x65, 0x0, 0x4, 0x2f, 0x0, @local, @multicast1, {[@cipso={0x86, 0x61, 0x3, [{0x1, 0xa, "ce7702539076779c"}, {0x1, 0xf, "10048acee6bac09cdc00d6c45c"}, {0x5, 0x8, "08ceb02d7aed"}, {0x0, 0x10, "8b677c6d32447c92a9b09c9a9d07"}, {0x0, 0x4, "8c3b"}, {0xe1db72a4527b5cf4, 0xa, "367b18be72c86098"}, {0x5, 0x2}, {0x2, 0xd, "272c15acd431b76f007bda"}, {0x6, 0xd, "d63267c7a1f6dfdb56e628"}]}, @end, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x46, 0x1, [{0x6, 0x8, "22899b1b00e9"}, {0x6, 0xc, "99956cab15162cdac773"}, {0x2, 0x9, "332f99acd63e69"}, {0x1, 0xb, "b21f5546a938a97995"}, {0x2, 0x11, "9d63646e16310180ebb8ff2e3b3ba4"}, {0x7, 0x7, "e7fbcf1a30"}]}, @noop, @timestamp_addr={0x44, 0x34, 0x28, 0x1, 0x6, [{@remote, 0x5}, {@private=0xa010100, 0x2}, {@private=0xa010101, 0x7}, {@remote, 0x5}, {@private=0xa010102, 0x7}, {@broadcast, 0x2}]}, @timestamp={0x44, 0x20, 0x6c, 0x0, 0x5, [0xffff, 0x0, 0x9, 0x81, 0xffff, 0xf6, 0x101]}, @ssrr={0x89, 0x13, 0x64, [@local, @multicast1, @dev={0xac, 0x14, 0x14, 0x16}, @private=0xa010100]}, @generic={0x7, 0xc, "62106a5c4e356dd57538"}, @cipso={0x86, 0x2e, 0x0, [{0x0, 0xd, "f77da362aa82ff4b834602"}, {0x1, 0x12, "13bd803cbc9efe7d19221b96dacf2767"}, {0x6, 0x5, "45cd01"}, {0x1, 0x4, "cdde"}]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000a40)=ANY=[@ANYRES16=r2], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', r9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0xb6d}, 0x90) r10 = socket$l2tp6(0xa, 0x2, 0x73) recvmsg(r10, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x2041) close(r2) r11 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x19, 0x27, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x88500}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @map_idx={0x18, 0xc, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='GPL\x00', 0x10000, 0xa0, &(0x7f0000000500)=""/160, 0x1e00, 0x0, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000840)=[r3, r6, r4], &(0x7f0000000880)=[{0x2, 0x4, 0x0, 0x2}, {0x5, 0x3, 0x1, 0xa}, {0x3, 0x3, 0xd}], 0x10, 0x6}, 0x90) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r11, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r13, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_AUTORATE={0x8}, @TCA_CAKE_INGRESS={0x8}]}}]}, 0x44}}, 0x0) sendmsg$unix(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {0x7a}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3a}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x8c}}, 0x0) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) getsockname(r4, &(0x7f0000000200)=@ax25={{0x3, @default}, [@default, @null, @rose, @null, @rose, @default]}, &(0x7f00000000c0)=0x80) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x3, 0xbd0193ee5617ed3b) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000180)={0x9e, 0x9, 0x2, "d1705ba2be9fb5b0cf410092b59221b33e2dfc50da39503f245a87afbb6cc8dbff6fb096863e4b40e3ce89a15fb77d323583120e2c0be5611b48fcf7bd0e52b08c07a44fb5f6cf1f69f7a3aac45b98db95644b8648eefd7384c4cde7ee9c3ec8a382fb521a37842a2332af27e21373056c1ba501a48fe4d5800dd1db44d67cca5fbee9f7a9e85a4e82020796ff7dffa1e921f5884a7195d5bfd40ed685df"}) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 2: r0 = timerfd_create(0x0, 0x0) read$eventfd(r0, &(0x7f0000001880), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x200000b, 0x12, r1, 0x0) ftruncate(r1, 0x8001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x16, 0x9, &(0x7f0000000180)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x52, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) syz_open_dev$vcsu(&(0x7f0000000040), 0xa930, 0x171280) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000240)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@const={0x9, 0x0, 0x0, 0xa, 0x5}, @const={0x8, 0x0, 0x0, 0xa, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x7f}}]}, {0x0, [0x61, 0x61, 0x0, 0x61, 0x2e, 0x61, 0x0]}}, &(0x7f0000000300), 0x51, 0x0, 0x0, 0x1000}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$pptp(0x18, 0x1, 0x2) connect(r2, &(0x7f00000000c0)=@ieee802154={0x24, @long}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000850000000f00000095000000000000003667b5afb72fd798ef6a502b9fe86e38622b76ffeef5e021fa7a877ce7ca36df0bbb83fb135d7c9af615f653e82fb2d5d69f619b4ec11fcdc43cbcc76bbc68a6c3be833ef3f3225eaa36b6351fc5d44d2bfe2e1a67ed5bd5eb5b"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kvm_dirty_ring_reset\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000000c0), &(0x7f0000000240)=r3}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f00000000c0), &(0x7f0000000240)=r3}, 0x20) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) (async) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) (async) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ftruncate(r0, 0x3) executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="de70c2501b60390f419ddcb4e7287bbdc4018c47de9521605d2a80381d55843f483eb25601767c31684ac7262d8fb5dcc5d3c195e2e7bee55c83d81f87ee3b4048e37ba5045b773999042eba67fcd0a14f7dd12ca9d97da4b9c7ecd4a8be72d0a4f91a2eb5ba16be1bcc89d2e581d400"/127, 0x7f}, {&(0x7f0000000100)="b914eecb980a88ba041534e03cddbb98c9931953b23519f567", 0x19}, {&(0x7f0000000140)="5b2119", 0x3}], 0x3}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}], 0x2, 0x0) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x5, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x37}, @func={0x2, 0x0, 0x0, 0xc, 0x1}, @ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0x4, 0x4}, {0xe}, {0x1, 0x5}, {0x0, 0x3}, {0x3, 0x3}, {0xe, 0x5}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0xd, 0x5}, {0x1}, {0x2}, {0x10, 0x3}, {0xc}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x79, 0x0, 0x5e, 0x5}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000340)=""/234, 0xd5, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 2: socket$inet_mptcp(0x2, 0x1, 0x106) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f0000000340)={0x34, r0, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, 0x34}}, 0x0) executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}, 0x700}], 0x1, 0x0) executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) r2 = shmget(0x0, 0x2000, 0x78000000, &(0x7f0000ffd000/0x2000)=nil) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x3000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="051a8fc2", @ANYRES16=r4, @ANYBLOB="01000000000000000000020000000500020000000000"], 0x1c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000000914010026bd7000fbdbdf25080001000100000008000100000000000800010001000000080001000000000008000100010000000800010e00000000"], 0x40}, 0x1, 0x0, 0x0, 0x40000c2}, 0x20000000) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1c, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="b40000000000000079109100000000007b0a00000042fe43bf1238a891a5e8867d03da2ac69d2d37aab67ba99e262ccbe7f377ae2b872a71e5eba0178458b88e9448744c5a2c245d026c6804917a3ce95ffbd2f75bcd8ff9634fabd164fb05115033b02060ccbbbaec914c5c5d25935c43871df5390bde4082c0ae6201828313100a04edde2e38e917b5345cc640a1e944a302b8bd4f54a3168da6c47083edb774424e9a66384438761a65c300528928f515b96af5f5487482061ce73b773a52348f83a8648a28518d8a643b4cbbee15cf94eec5be99c2ca70a12c0128286700b05e807e5bc496a423a5b7cc9680f7091ce5ffdd515bcdfa1d4a10aa8b2fc99fde5512"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xcc, &(0x7f00000004c0)=""/204, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 3: ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x6, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x2, [{0x0, 0x1, 0x1000000}]}]}}, 0x0, 0x42}, 0x20) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6d}, @jmp={0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x0, 0x0, 0x0}, 0x90) r5 = syz_io_uring_setup(0x3b67, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)) io_uring_enter(r5, 0xb15, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r3, 0x18000000000002a0, 0x5a, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000080)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$notify(r6, 0x402, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0xb2) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r3 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40008000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="880000000b0303002dbd7000fddbafaf2824f13057fdfb00", @ANYRES32=0x0, @ANYBLOB="ec8009e367d5b2c9c4ee122a2371f5dfa8d4bf32f37b867a6de6d8b85b7db3df4046e0f1fbe4c630098a0dd08ba0f69255d49acc37c49b4e533ed1214f46f0e4cc25a427df0f8d39cdd89626603fb722de4a148bec0c003000030000000000000008006800", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00'], 0x88}, 0x1, 0x0, 0x0, 0x20040020}, 0x80) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0}]) executing program 4: r0 = timerfd_create(0x0, 0x0) read$eventfd(r0, &(0x7f0000001880), 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x200000b, 0x12, r1, 0x0) ftruncate(r1, 0x8001) pidfd_getfd(r1, r1, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x700}], 0x1, 0x0) executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f00000000c0)=0x3) iopl(0x3) munmap(&(0x7f00004eb000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2, &(0x7f0000000100)={[{@journal_dev={'journal_dev', 0x3d, 0xe6f5}}, {@dioread_lock}]}, 0x9, 0x626, &(0x7f0000000d40)="$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") clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x8000000000000001]}, &(0x7f0000000180), &(0x7f0000000200)={r0, r1+10000000}, 0x8) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 145.212326][ T8592] loop2: detected capacity change from 0 to 1024 [ 145.221833][ T8592] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 145.231939][ T8592] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 145.240725][ T8592] EXT4-fs (loop2): filesystem has both journal inode and journal device! [ 145.249946][ T28] kauditd_printk_skb: 1479 callbacks suppressed executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) fcntl$dupfd(r0, 0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r1, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r3, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(0xffffffffffffffff) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) [ 145.249958][ T28] audit: type=1326 audit(1713989554.211:9297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.280273][ T28] audit: type=1326 audit(1713989554.211:9298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.304335][ T28] audit: type=1326 audit(1713989554.211:9299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.328252][ T28] audit: type=1326 audit(1713989554.211:9300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.352217][ T28] audit: type=1326 audit(1713989554.211:9301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.376020][ T28] audit: type=1326 audit(1713989554.211:9302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x301, 0x3) [ 145.399996][ T28] audit: type=1326 audit(1713989554.211:9303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=133 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.424197][ T28] audit: type=1326 audit(1713989554.211:9304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r1 = fcntl$dupfd(r0, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000300)={'wg1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r3, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a", 0x14}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) [ 145.448283][ T28] audit: type=1326 audit(1713989554.211:9305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 [ 145.472151][ T28] audit: type=1326 audit(1713989554.211:9306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7f9bf8b67ea9 code=0x7ffc0000 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$kcm(0x10, 0x2, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) r11 = fcntl$dupfd(r10, 0x0, r10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r11, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) fcntl$dupfd(r0, 0x0, r0) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r2, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a", 0x14}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(0x0, 0x16d43e, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) executing program 4: syz_clone3(0x0, 0x0) executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000003000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000040000001821000088ab8251c0f747febca585bd22aeba21c7d929348222a917cb80f24f4dfb3532ee1f976cafdbf7c238fee13564afaa2be747506513c9dd0281ce8f3f324caaa78a7b86cb0ea9f948d76ca30739ff5c2a31f180053950f2f6ebb5717f6a46b4a7328d407cca7d9704b97b6dcc78f58381c8ab07bb506331c2f08bb8b9f1f6dab7b0c47a9ebeaf3ff15f53963f0251e14fa0edd266ea82956a8f4a46a5eb023ac94b99670328dd185abef04db70ad468", @ANYRES32, @ANYBLOB="00000000f9ffffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000400000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x90) r2 = socket$tipc(0x1e, 0x2, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r3, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x8000000004) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r5, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff810540010000000058000b480400945f64009400050038925a01000000000000008004000000ffe809000000fff5dd0000000800030006010000418e01400004fcff", 0x58}], 0x1) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0xfffffffe}, 0x10) r6 = socket$tipc(0x1e, 0x5, 0x0) r7 = socket$tipc(0x1e, 0x2, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x0, 0x0, 0x0}, 0x90) r9 = syz_io_uring_setup(0x3b67, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x48bf, &(0x7f0000000280), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r12 = dup(r9) syz_io_uring_submit(r11, r10, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r12, 0x5d64, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r9, 0xb15, 0x0, 0x0, 0x0, 0x0) r13 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r13, &(0x7f0000000440)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x83f}, 0x10) sendmsg$tipc(r6, &(0x7f0000000380)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2004, 0x2004}}, 0x10, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='rss_stat\x00', r1}, 0x10) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000100)=0x7, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NFT_BATCH(r8, &(0x7f0000000900)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000008c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x24c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r5 = socket(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a", 0x14}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: syz_clone3(&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) (async) io_setup(0x0, 0x0) (async) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7b}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r1, &(0x7f0000000000)="ac", 0x1, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) (async) readahead(r1, 0x1000, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(0x0, 0x16d43e, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c1", 0x1e}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}, 0x700}], 0x1, 0x0) executing program 1: syz_clone3(&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@mangle={'mangle\x00', 0x2, 0x6, 0x588, 0x0, 0x3e8, 0x3e8, 0x0, 0xf0, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0, 0x0, {0x7a00000000000000}}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@empty, @ipv4=@broadcast, 0xff}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], '\x00', 'bond_slave_0\x00'}, 0x0, 0xa8, 0xd0, 0x48000000}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv6=@private1}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @local, [], [], 'veth1_macvtap\x00', 'batadv_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e8) r1 = socket$l2tp6(0xa, 0x2, 0x73) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r2, &(0x7f00000001c0)={0x10}, 0x10) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, {0x1, @remote, 'gre0\x00'}}, 0x1e) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000400)={0x18, 0x0, {0x1, @empty, 'ip6gre0\x00'}}, 0x1e) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000006c0)='.\x00', 0x0) symlinkat(&(0x7f0000000480)='./file0/file0\x00', r4, &(0x7f00000000c0)='./file1\x00') ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x1) r5 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r5, 0x3) r6 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r6, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r7 = accept4(r5, 0x0, 0x0, 0x0) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0x1, 0x1}, 0x20) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @remote}}, 0x20) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r7) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r6, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r7, &(0x7f0000001500), 0x588, 0x0) sendmmsg$inet6(r1, &(0x7f0000000d80)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @loopback, 0x7fff}, 0x1c, 0x0}}], 0x1, 0x0) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x32) r5 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x5, "d9fe8f6611"}, &(0x7f0000000080)=0xd) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000180)=r6, 0x4) connect$pppl2tp(r5, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r5, 0x40047452, 0xfffffffffffffffe) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfefc) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(r2, 0x107, 0x13, 0x0, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 4: syz_clone3(&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c1", 0x1e}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = dup3(r0, r0, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9, 0x21}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x48000) socket$inet(0x2, 0x6, 0x769) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x80, 0x30e0, 0x1ff}, 0x1}, 0x20, 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000200)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @empty, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) rseq(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1, 0x80000001, 0x40, 0x4}, 0x4}, 0x20, 0x0, 0x0) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x400800, 0x80) getsockopt$inet6_dccp_buf(r5, 0x21, 0x0, &(0x7f0000000300)=""/191, &(0x7f00000003c0)=0xbf) r6 = openat$cgroup_ro(r0, &(0x7f0000000400)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000440)=0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x5, '\x00', 0x0, r2, 0x1, 0x0, 0x5}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001680)={'team0\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x62, 0x62, 0x9, [@datasec={0xb, 0x7, 0x0, 0xf, 0x2, [{0x4, 0x8, 0x1ff}, {0x4, 0x9, 0x1c70}, {0x3, 0x7, 0x7}, {0x5, 0x2c8b, 0x80}, {0x2, 0x4, 0xd3}, {0x2, 0x4, 0x4}, {0x1, 0x2, 0x101}], 'g;'}]}, {0x0, [0x0, 0x5f, 0x30, 0x5f, 0x2e, 0x2e, 0x5f]}}, &(0x7f0000001780)=""/204, 0x85, 0xcc, 0x0, 0x401}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x8, 0x1b, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4bd}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0xa4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @ldst={0x2, 0x2, 0x4, 0x2, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='syzkaller\x00', 0x20, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x10, '\x00', r9, 0x7, r10, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000001900)=[r4, r0, r0, r6], 0x0, 0x10, 0x5}, 0x90) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x0, [0x3, 0x0, 0x6]}, &(0x7f00000002c0)=0x44) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f00000000c0), &(0x7f0000000140)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="bc0100003400010000000000ffdbdf2500000000000000000000000000000000ac1e000100000000000000000000000000000000000000000a00000000000000", @ANYRES64=r3, @ANYRES32=0x0, @ANYRESDEC=r3], 0x1bc}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x8031, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000000200)=[{0x1, 0x1, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/40, 0x28}], &(0x7f0000000140)=[0x7, 0x3, 0xfffffffffffffffa, 0x9]}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mbind(&(0x7f00004f8000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000001b80)={'netdevsim0\x00', 0x0}) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r4, 0x5403, 0x0) r5 = syz_open_dev$sg(&(0x7f00000000c0), 0x401, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00'}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) [ 146.184856][ T8714] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=52 sclass=netlink_xfrm_socket pid=8714 comm=syz-executor.2 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f0000000180)=0x3, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) executing program 2: syz_clone3(&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) (async) r2 = shmget(0x0, 0x2000, 0x78000000, &(0x7f0000ffd000/0x2000)=nil) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) (async) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x3000) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="051a8fc2", @ANYRES16=r4, @ANYBLOB="01000000000000000000020000000500020000000000"], 0x1c}}, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000000914010026bd7000fbdbdf25080001000100000008000100000000000800010001000000080001000000000008000100010000000800010e00000000"], 0x40}, 0x1, 0x0, 0x0, 0x40000c2}, 0x20000000) (async) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) (async) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1c, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xcc, &(0x7f00000004c0)=""/204, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000100), 0x2) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000340)=""/234, 0x0, 0xea, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[], 0x4b0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) quotactl$Q_GETINFO(0xffffffff80000501, &(0x7f0000000100)=@nullb, r1, &(0x7f0000000340)) close(r0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) io_setup(0x1f, &(0x7f0000000080)=0x0) r4 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f00000004c0), 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x4, &(0x7f0000000980), &(0x7f0000000a80)=0x4) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x58, &(0x7f0000000100)={[{@abort}, {@bh}, {@nomblk_io_submit}, {@stripe={'stripe', 0x3d, 0x4ffff}}, {@norecovery}, {@minixdf}, {@nobh}]}, 0xfe, 0x799, &(0x7f00000001c0)="$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") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, 0x0}, 0x90) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000ce", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@sack_perm={0x2, 0x4}]}}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003180)={0x6, 0x1, &(0x7f0000003000)=@raw=[@exit], &(0x7f0000003100)='syzkaller\x00', 0x9}, 0x90) r6 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000940)={@map, 0xffffffffffffffff, 0x13}, 0x20) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000ac0)=@isofs_parent={0x14, 0x2, {0x1, 0x4, 0x9, 0x6, 0x9}}, 0x100400) newfstatat(0xffffffffffffff9c, &(0x7f00000009c0)='./file2\x00', &(0x7f0000000a00), 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) io_submit(r3, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x0, r4, 0x0}]) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x0, [0x3, 0x0, 0x6]}, &(0x7f00000002c0)=0x44) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f00000000c0), &(0x7f0000000140)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="bc0100003400010000000000ffdbdf2500000000000000000000000000000000ac1e000100000000000000000000000000000000000000000a00000000000000", @ANYRES64=r3, @ANYRES32=0x0, @ANYRESDEC=r3], 0x1bc}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x8031, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000000200)=[{0x1, 0x1, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/40, 0x28}], &(0x7f0000000140)=[0x7, 0x3, 0xfffffffffffffffa, 0x9]}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mbind(&(0x7f00004f8000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000001b80)={'netdevsim0\x00', 0x0}) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r4, 0x5403, 0x0) r5 = syz_open_dev$sg(&(0x7f00000000c0), 0x401, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00'}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) executing program 0: syz_clone3(&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, 0x58) executing program 0: ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080)=0x6, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x2, [{0x0, 0x1, 0x1000000}]}]}}, 0x0, 0x42}, 0x20) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6d}, @jmp={0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) (async, rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) (rerun: 64) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x0, 0x0, 0x0}, 0x90) (async) r5 = syz_io_uring_setup(0x3b67, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)) io_uring_enter(r5, 0xb15, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r3, 0x18000000000002a0, 0x5a, 0x60000004, &(0x7f0000000100)="b9ff03076044238cb89e14f089020de0ffff00184000632f77fbac14140ee000000d62079f4b4d0f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000080)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) (async, rerun: 32) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) (rerun: 32) fcntl$notify(r6, 0x402, 0x20) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) (rerun: 64) [ 146.591066][ T8741] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=52 sclass=netlink_xfrm_socket pid=8741 comm=syz-executor.2 [ 146.592125][ T8739] loop4: detected capacity change from 0 to 2048 [ 146.611264][ T8739] EXT4-fs: Ignoring removed bh option [ 146.616716][ T8739] EXT4-fs: Ignoring removed nomblk_io_submit option [ 146.628400][ T8739] EXT4-fs: Ignoring removed nobh option executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 146.650028][ T8739] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 146.678086][ T8739] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e954", 0x23}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000100)=0x0) r2 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) [ 146.702077][ T8739] EXT4-fs error (device loop4): __ext4_remount:6529: comm syz-executor.4: Abort forced by user [ 146.722154][ T8739] EXT4-fs (loop4): Remounting filesystem read-only executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000003200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x1f, 0x80000, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3f) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3400000010001fff00"/20, @ANYRES32=r4, @ANYBLOB="0000000000694400140012800b000100626174616476"], 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r6 = dup(0xffffffffffffffff) ioctl$TIOCL_SETSEL(r6, 0x5609, &(0x7f0000000080)={0x2, {0xc}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000400000018000000070000000000000006000000bd58ffff1000000018270000", @ANYRES32, @ANYBLOB="00000000c400000095ef070000000000"], &(0x7f0000000440)='GPL\x00', 0x2, 0x23, &(0x7f0000000480)=""/35, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r6], &(0x7f0000000680), 0x10, 0x40}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETNOCSUM(r7, 0xc0189436, 0x400000000000000) read(r5, &(0x7f0000000200)=""/209, 0xd1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc0c0583b, &(0x7f0000000000)) fsconfig$FSCONFIG_SET_STRING(r8, 0x1, &(0x7f0000000300)='()}(\x15\'#$\x00', &(0x7f00000003c0)='\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000080)={0x335, @tick, 0xfe}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r9 = socket(0x18, 0x0, 0x0) setsockopt$sock_int(r9, 0x1, 0x0, &(0x7f0000000040)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$nfs4(&(0x7f0000000080)='\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="2c76657468d4bd7e1a7f6c433b45d5d05f626f6e64002c646f6e745f686173682c00"]) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000300)="e3b1ed39ac10d6da4ca5a755ba202149cfb4a5b960acabc0be0c70ff72bfb0e96439578147e0817949ba825461316a0e39c40cc4d3ac1c2eff7d5430c5426730fe5d12f970e22a61019b5097986ee426b7d56215e8f8123be26be053d654c3c5de4e7a870886e1de74b71eb5eb8500325841c9ecec1f1144e6d3693fc5ef2e3e0e", 0x81}], 0x1, 0x0, 0x0) write$binfmt_aout(r10, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r10, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) pipe(&(0x7f0000000180)) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) [ 146.744446][ T8739] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=16 [ 146.758023][ T8739] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = dup3(r0, r0, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9, 0x21}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x48000) socket$inet(0x2, 0x6, 0x769) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x80, 0x30e0, 0x1ff}, 0x1}, 0x20, 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000200)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @empty, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) rseq(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1, 0x80000001, 0x40, 0x4}, 0x4}, 0x20, 0x1, 0x0) r5 = open(0x0, 0x400800, 0x80) getsockopt$inet6_dccp_buf(r5, 0x21, 0x0, &(0x7f0000000300)=""/191, &(0x7f00000003c0)=0xbf) r6 = openat$cgroup_ro(r0, &(0x7f0000000400)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000440)=0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x5, '\x00', 0x0, r2, 0x1, 0x0, 0x5}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001680)={'team0\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x62, 0x62, 0x9, [@datasec={0xb, 0x7, 0x0, 0xf, 0x2, [{0x4, 0x8, 0x1ff}, {0x4, 0x9, 0x1c70}, {0x3, 0x7, 0x7}, {0x5, 0x2c8b, 0x80}, {0x2, 0x4, 0xd3}, {0x2, 0x4, 0x4}, {0x1, 0x2, 0x101}], 'g;'}]}, {0x0, [0x0, 0x5f, 0x30, 0x5f, 0x2e, 0x2e, 0x5f]}}, &(0x7f0000001780)=""/204, 0x85, 0xcc, 0x0, 0x401}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x8, 0x1b, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4bd}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0xa4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @ldst={0x2, 0x2, 0x4, 0x2, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='syzkaller\x00', 0x20, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x10, '\x00', r9, 0x7, r10, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000001900)=[r4, r0, r0, r6], 0x0, 0x10, 0x5}, 0x90) executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x3, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000043, &(0x7f0000000000)={[{@auto_da_alloc_val}]}, 0xa, 0x501, &(0x7f0000000140)="$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") setgroups(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000004e80)=ANY=[@ANYBLOB="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"/4699], &(0x7f0000000100)='GPL\x00'}, 0x41) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x2007, 0x7f, @loopback, 0x800}], 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) fsopen(&(0x7f0000000000)='bpf\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) symlinkat(&(0x7f0000000040)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x84a}, 0x28) [ 146.879490][ T3116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 146.888990][ T8767] nfs4: Bad value for 'source' executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000043, &(0x7f0000000000)={[{@auto_da_alloc_val}]}, 0xa, 0x501, &(0x7f0000000140)="$eJzs3U9vG2kZAPBnnHibpGGdXTgsK7FbdrtKEdRJNvsn4rBsJf6cVkKUexoSJ4rixFXitE1UQfoJQKgCJE6cuCDxAZBQPwJCqgQ3DpxAFaTtgQsyGnvcJo6dJtRrt87vJ03nnfet53mepB7POzOqAzizLkTEpxExFBHvRUQh689lS+w1lvTvPdy/vZguSdRqV/+VRJL1te7zfPay1A++F/Gj5GjcrZ3dtYVyubR5uHv38ur6wkpppbQxOzvz0dzHcx/OTZ+wkmT4uNFXI+KTbz/+xU9/+91P/viNm3+f/+elH+cj4lo23q6ObmiUno+Rc82eY9N86QxlFeX7nQgAACdyMSJej4h3IuJrUYihATs/BQAAACJq3xpv3pmqAQAAAIMpFxHjkeSK2fO+45HLFYuNZ3i/FGO5cmWr+vXlyvbGUjoWMRH53PJquTSdPSs8Efkk3Z6pt59uv9+yPRsRr0XE3cJoul0fAwAAAHrjfMv8/3GhMf8HAAAABoyb8QAAADD4zP8BAABg8Jn/AwAAwED7/mefpUvt4f7t+vcALN3Y2V6r3Li8VNpaK65vLxYXK5vXiyuVykq5VBx69v7Klcr1D2Jj+9ZUdXirOrW1szu/XtneqM7Xv9d7vvR6D2oCAAAADnvt7Xt/TSJi75uj9SX1SjaW72tmwAskGW7puPbVPmUCdMUJLukfdmH780kE6LnWz3Tg7DDHB5LWjpYTg5FOpwp/On0s5xwAANAfk192/x/Oqly/EwD65mf9TgDoG9fi4ezKn/4JQGDAHLn/32Kk08Az7v8/vYZYq506KQAAoKvGG6u9yO4FjkcuVyw+uS2YLK+WS9MR8WpE/KWQP5duz/QxXwAAAAAAAAAAAAAAAAAAAAAAAAB4GdVqSdQAAACAgRaR+0eSff/XZOHieOv1gVeS/xTq64i4+eurv7y1UK1uzqT9/37SX/1V1v9+P65gAAAAwFmUP3a0OU9vzuMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoJse7t9ebC69jPvgSozGRLv4wzFSX49EPiLGHiUxfOB1SUQMdSH+3p2IeKNd/CRNKyayLMYenTv0ulxEjPY0/uH60/jnuxAfzrJ7VyLi03bvv1xcqK/bv/+Gs+V5PbhSf5O3jd88/g11OP594YQx3rz/+6mO8e9EvDnc/vjTjJ90iP/uCeNf++Hubqex2m8iJtt+/iSHYk1V169Pbe3sXl5dX1gprZQ2ZmdnPpr7eO7Duemp5dVyKfuzbYyff+UPe3c71p+rrw/Gb9Y50cjwJ53qv3jC+v97/9b+FxvN/NH4EZfebf/7f6O+bv/zT/9NvJd9DqTjk832XqN90Fu/+/NbnXJL4y91+Pk3fv+FWqf6L3UuOTnQPlIzANBfWzu7awvlcmmzB413PujeDpMe5fwyNFbGInoedOTFqL3Xje88936ap8PPs5+/da2udM7QfqjPByYAAKDrnp709zsTAAAAAAAAAAAAAAAAAAAAOLv+r/887O3Tvao15l5/SgUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONb/AgAA//9nwsbL") setgroups(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000004e80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cd0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45da0b101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ac3a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400"/4699], &(0x7f0000000100)='GPL\x00'}, 0x41) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x2007, 0x7f, @loopback, 0x800}], 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) fsopen(&(0x7f0000000000)='bpf\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) symlinkat(&(0x7f0000000040)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x84a}, 0x28) executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002080)=""/4096, 0x1000) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x30) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8100, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x800, [0x0]}}}}}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) get_mempolicy(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) tkill(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x86dd}]}, 0x1c}}, 0x4001) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="7000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff000000ff480012800b0001006272696467650000380002800800050001000000080004000100000005001800000000000c001f000000000000000000060006000700000008001d000100000008000a0001"], 0x70}}, 0x40000) [ 146.952154][ T8771] loop2: detected capacity change from 0 to 512 [ 146.956430][ T8773] loop1: detected capacity change from 0 to 512 [ 146.965866][ T8771] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 146.975254][ T8773] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 146.975991][ T8771] EXT4-fs (loop2): orphan cleanup on readonly fs executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = dup3(r0, r0, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9, 0x21}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x48000) socket$inet(0x2, 0x6, 0x769) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x80, 0x30e0, 0x1ff}, 0x1}, 0x20, 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000200)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @empty, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) rseq(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1, 0x80000001, 0x40, 0x4}, 0x4}, 0x20, 0x1, 0x0) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x80) getsockopt$inet6_dccp_buf(r5, 0x21, 0x0, &(0x7f0000000300)=""/191, &(0x7f00000003c0)=0xbf) r6 = openat$cgroup_ro(r0, &(0x7f0000000400)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000440)=0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x5, '\x00', 0x0, r2, 0x1, 0x0, 0x5}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001680)={'team0\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x62, 0x62, 0x9, [@datasec={0xb, 0x7, 0x0, 0xf, 0x2, [{0x4, 0x8, 0x1ff}, {0x4, 0x9, 0x1c70}, {0x3, 0x7, 0x7}, {0x5, 0x2c8b, 0x80}, {0x2, 0x4, 0xd3}, {0x2, 0x4, 0x4}, {0x1, 0x2, 0x101}], 'g;'}]}, {0x0, [0x0, 0x5f, 0x30, 0x5f, 0x2e, 0x2e, 0x5f]}}, &(0x7f0000001780)=""/204, 0x85, 0xcc, 0x0, 0x401}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x8, 0x1b, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4bd}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0xa4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @ldst={0x2, 0x2, 0x4, 0x2, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='syzkaller\x00', 0x20, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x10, '\x00', r9, 0x7, r10, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000001900)=[r4, r0, r0, r6], 0x0, 0x10, 0x5}, 0x90) [ 146.990988][ T8771] EXT4-fs error (device loop2): ext4_ext_check_inode:520: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 7, max 0(0), depth 0(0) [ 146.991914][ T8773] EXT4-fs (loop1): orphan cleanup on readonly fs [ 147.016660][ T8773] EXT4-fs error (device loop1): ext4_ext_check_inode:520: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 7, max 0(0), depth 0(0) [ 147.018689][ T8771] EXT4-fs error (device loop2): ext4_quota_enable:7063: comm syz-executor.2: Bad quota inode: 3, type: 0 [ 147.039968][ T8779] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 147.053942][ T8771] EXT4-fs warning (device loop2): ext4_enable_quotas:7104: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 147.067104][ T8773] EXT4-fs error (device loop1): ext4_quota_enable:7063: comm syz-executor.1: Bad quota inode: 3, type: 0 [ 147.068565][ T8771] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 147.083443][ T8773] EXT4-fs warning (device loop1): ext4_enable_quotas:7104: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. executing program 2: sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) [ 147.086522][ T8771] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 147.101165][ T8773] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 147.120255][ T8773] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1000000, &(0x7f0000000500), 0x83, 0x48d, &(0x7f0000000dc0)="$eJzs3ctvVNUfAPDvvdMH7/bHDx88lCoaG9GWVlQWbjSasDEx0YUua6kEKWBoTYQQQWNwafwL1KWJf4Er3Bh1pXGre2NCDBvQhRlz79xbZqbT0pkyDGU+n2SGc+5jzvnec0/nzD13hgD61lj2lERsi4jfImKklm3cYKz2z41rF2b/vnZhNolq9fW/kny769cuzJablvttLTLjaUT6SRJ7W5S7OSJm5ufnzhb5ycVT700unDv/9IlTM8fnjs+dnj5y5PAzU88/N/3sbYkzi+v6ng/P7Nt99K3PX52txts/fpPVd1uxvj6OmtF1lzkWY1GtVqtpw9Kh/Pnxdb/63WV7XToZ6GFFaEslIrLmGsz7/0hU4mbjjcQrH/e0ckBXZe9Pw8uWVvLnpFgP3KsSfRz6VPmOn33+LR93dgTSW1dfzJ7n8vhvFI/amoHIPrcno7VP7JUulb8tknjz0j9fZI9oeR0CAOD2upKNf55qNf5L4/667XYUcyijEXEwInZGxP8jYldE3BeRb/tARDzYZvljTfnl459fNncU2Bpl478XirmtxvHf0qzNaKXIbc/jH0zeOTE/d6g4JuMxOJzlp1Yp47uXf/1spXVZ/OX4L3tk5ZdjwaIefw40XaA7NrM4s56Y6139KGLPQKv4k6WZgCQidkfEng5ePztmJ578el+W3rF1+fr6+AeKdmiMfzWXOqhRo+pXEU/Uyr0UTfGXktoUyUrzk5ObYn7u0GR5Viz308+XX6vPD9alb93+3ZW1/5aW538Rf9kNzp0/mc/XLrRfxuXfP13xM00n5/9wLM4MJW/k6aFi2Qczi4tnpyKGigUNy6dv7lvmy+2z+McPtO7/OyP+/bLYb29EZCfxQxHxcETsL+r+SEQ8GhEHVon/h5cee3f1I9Tb9j+2WvtHjGaphaX2bz9ROfn9tyuVf4v2v5Lk7X84z4wXC9fy92+tFVzn4QMAAIANIa3NQacTS+k0nZio3cO/K7ak82cWFg+Oxfunj9XulR+NwbS80jVSdz10qrg2XOanm/KbIuJ/+Z1Gm/P8xOyZ+e29Dh763NYV+n/mj27d9ALcPdr6vlbSvXoAd15b/b/5jg1gQxto928AcM/Q96F/6f/Qv1r1/4sRN3pQFeAO8/4P/Uv/h/6l/0P/0v+hLy3/Snz5cyudfNP/ZmLn0XXt3keJSpdeOep/tKMLiUh7fug6T6R3QzX2F4nh8v/CWMNeF7vaps3nDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwMb3XwAAAP//ezrgIA==") r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='memory.pressure\x00', 0x2, 0x0) mmap(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x2000004, 0x30, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000005880)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000800010002000000f36d05f0d4f3ad139f974200"/45], 0x28}}, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @dev}, 0x2}}, 0x2e) close(r5) r7 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r7, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2, 0x0, 0x0, 0x2}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r7, 0x80047453, &(0x7f0000005280)) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001580)=@newtaction={0x894, 0x30, 0x1, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_AVRATE={0x8}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x8, 0x0, 0x0, 0x0, 0x0, 0x84}}}], [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x894}}, 0x0) executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) [ 147.147847][ T6862] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 147.173353][ T6591] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, r1, 0x0, 0x2) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x7f, 0x0) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(0x0, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}]) executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 147.232507][ T8787] loop1: detected capacity change from 0 to 512 [ 147.245892][ T8787] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2250: inode #15: comm syz-executor.1: corrupted in-inode xattr: bad e_name length [ 147.266653][ T8787] EXT4-fs error (device loop1): ext4_orphan_get:1399: comm syz-executor.1: couldn't read orphan inode 15 (err -117) executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x7400, 0x4) executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) (async, rerun: 32) write(r0, &(0x7f0000000240)="a4", 0x1) (rerun: 32) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "cb82fc700b8a21ec090ed59e4b133694f18dc8"}) executing program 3: syz_emit_ethernet(0x7a, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, r1, 0x0, 0x2) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) [ 147.288722][ T8787] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 147.310452][ T8799] sctp: [Deprecated]: syz-executor.4 (pid 8799) Use of int in max_burst socket option deprecated. [ 147.310452][ T8799] Use struct sctp_assoc_value instead executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x7f, 0x0) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(0x0, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}]) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002080)=""/4096, 0x1000) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x30) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8100, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x800, [0x0]}}}}}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) get_mempolicy(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) tkill(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x86dd}]}, 0x1c}}, 0x4001) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="7000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff000000ff480012800b0001006272696467650000380002800800050001000000080004000100000005001800000000000c001f000000000000000000060006000700000008001d000100000008000a0001"], 0x70}}, 0x40000) executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x10, &(0x7f0000000740), 0xfe, 0x48d, &(0x7f0000000dc0)="$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") r0 = open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) link(&(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') link(&(0x7f0000001240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x400, 0x4) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='./file1\x00') [ 147.356780][ T6591] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 147.413435][ T8824] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 147.422498][ T8823] loop3: detected capacity change from 0 to 512 [ 147.431255][ T8823] EXT4-fs error (device loop3): ext4_xattr_ibody_find:2250: inode #15: comm syz-executor.3: corrupted in-inode xattr: invalid ea_ino [ 147.445256][ T8823] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, r1, &(0x7f0000000100), 0x0) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) [ 147.457629][ T8823] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 147.473141][ T8823] EXT4-fs warning (device loop3): dx_probe:832: inode #2: comm syz-executor.3: Unrecognised inode hash code 4 [ 147.484800][ T8823] EXT4-fs warning (device loop3): dx_probe:965: inode #2: comm syz-executor.3: Corrupt directory, running e2fsck is recommended executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) [ 147.506382][ T7937] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: syz_emit_ethernet(0x7a, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, 0x0, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) executing program 0: syz_clone3(&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r1}, 0x48) r3 = socket(0x2b, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) listen(r3, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)={0x17be11}) r5 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x3, [{0x5, 0x2, 0x2}], "491eaf"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "d5"}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000006c0)=""/50, 0x46, 0x32, 0x1}, 0x20) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) open(&(0x7f0000022ff6)='./file0\x00', 0x8000, 0x0) socket$rxrpc(0x21, 0x2, 0xa) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r6 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x4011, r6, 0x0) poll(&(0x7f0000000100)=[{r4}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r8, &(0x7f0000000200)={0x1f, 0xffffffffffffffff}, 0x6) close_range(r7, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x10, 0x5, 0x0) socket$igmp(0x2, 0x3, 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc8080, 0x0) executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002080)=""/4096, 0x1000) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x30) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8100, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x800, [0x0]}}}}}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) get_mempolicy(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) tkill(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x86dd}]}, 0x1c}}, 0x4001) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="7000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff000000ff480012800b0001006272696467650000380002800800050001000000080004000100000005001800000000000c001f000000000000000000060006000700000008001d000100000008000a0001"], 0x70}}, 0x40000) executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) [ 147.659923][ T8843] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, r1, &(0x7f0000000100), 0x0) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r2, 0x0, r2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x3ff}, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x127e, 0xffffffffffffffff) executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000043, &(0x7f0000000000)={[{@auto_da_alloc_val}]}, 0xa, 0x501, &(0x7f0000000140)="$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") setgroups(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x2007, 0x7f, @loopback, 0x800}], 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) fsopen(&(0x7f0000000000)='bpf\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) symlinkat(&(0x7f0000000040)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x84a}, 0x28) [ 147.741098][ T8853] loop0: detected capacity change from 0 to 512 [ 147.748908][ T8853] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 147.758963][ T8853] EXT4-fs (loop0): orphan cleanup on readonly fs [ 147.765977][ T8853] EXT4-fs error (device loop0): ext4_ext_check_inode:520: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 7, max 0(0), depth 0(0) executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000300), &(0x7f00000003c0), 0x8, 0x25, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r4, 0xff, 0x1, &(0x7f0000000100)='O', 0x7) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="0180c20000000180c20000000800450000300000000000d5000000800000000014aa030090780300183f450000000000000000000000ac1414aaac141400"], 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000000480)='syzkaller\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3}, 0x18) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x40000, 0x0}, 0x0) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='tracefs\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x8000000) executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000000)=""/157, 0x41100}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 147.784046][ T8853] EXT4-fs error (device loop0): ext4_quota_enable:7063: comm syz-executor.0: Bad quota inode: 3, type: 0 [ 147.796451][ T8853] EXT4-fs warning (device loop0): ext4_enable_quotas:7104: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 147.811090][ T8853] EXT4-fs (loop0): Cannot turn on quotas: error -117 [ 147.818725][ T8853] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) [ 147.851488][ T8307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 0: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) r3 = socket$pppl2tp(0x18, 0x1, 0x1) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x32) r5 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x5, "d9fe8f6611"}, &(0x7f0000000080)=0xd) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000180)=r6, 0x4) (async) connect$pppl2tp(r5, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r5, 0x40047452, 0xfffffffffffffffe) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) (async) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfefc) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$nfc_llcp(r2, 0x107, 0x13, 0x0, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001180)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x9) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) fgetxattr(r2, &(0x7f0000001080)=@random={'security.', '\x00'}, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r4 = socket(0x25, 0x1, 0x8377) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001a000100000090eb480000fbdbdf251c00200000000000000000001400120010007629e929fa00000000000000000046ff468f2d306dd1edf8f7d2716af36c3754058195f996a74a0208df72072f884e294f1fea7ddaa291c0d89beee2402b3e4fb4f638577f2e27638761595e8c75bbbc539e6615000dec7b6ba0c7ddcffb3e9be0d0eedb2bef1dfaabc337284a4e9c5ea167862e44dc55dbd38fcd628390a4e32b4f0c81d59feacb52516cc77d52"], 0x30}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r5, &(0x7f0000001480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1}, [{0x3, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x800}]}, 0x78) r6 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGBITKEY(r6, 0x80404521, &(0x7f000001bf40)=""/46) close(r5) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x6) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x800) lseek(r7, 0x200, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x4, {0x0, 0x10, 0x0, r9, 0x44022}, [@IFLA_VFINFO_LIST={0x4}, @IFLA_LINKMODE={0x5}]}, 0x10}}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r11}, 0x10) r12 = open(&(0x7f0000000000)='./bus\x00', 0x2c880, 0x0) sendfile(r7, r12, 0x0, 0xf800) executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000043, &(0x7f0000000000)={[{@auto_da_alloc_val}]}, 0xa, 0x501, &(0x7f0000000140)="$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") setgroups(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x2007, 0x7f, @loopback, 0x800}], 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) fsopen(&(0x7f0000000000)='bpf\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) symlinkat(&(0x7f0000000040)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x84a}, 0x28) executing program 0: syz_emit_ethernet(0x7a, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, 0x0, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, r1, &(0x7f0000000100), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) fchown(r1, 0x0, 0x0) executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = dup3(r0, r0, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9, 0x21}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x48000) socket$inet(0x2, 0x6, 0x769) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x80, 0x30e0, 0x1ff}, 0x1}, 0x20, 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000200)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @empty, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) rseq(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1, 0x80000001, 0x40, 0x4}, 0x4}, 0x20, 0x1, 0x0) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x80) getsockopt$inet6_dccp_buf(r5, 0x21, 0x0, &(0x7f0000000300)=""/191, &(0x7f00000003c0)=0xbf) r6 = openat$cgroup_ro(r0, &(0x7f0000000400)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000440)=0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x5, '\x00', 0x0, r2, 0x1, 0x0, 0x5}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001680)={'team0\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x62, 0x62, 0x9, [@datasec={0xb, 0x7, 0x0, 0xf, 0x2, [{0x4, 0x8, 0x1ff}, {0x4, 0x9, 0x1c70}, {0x3, 0x7, 0x7}, {0x5, 0x2c8b, 0x80}, {0x2, 0x4, 0xd3}, {0x2, 0x4, 0x4}, {0x1, 0x2, 0x101}], 'g;'}]}, {0x0, [0x0, 0x5f, 0x30, 0x5f, 0x2e, 0x2e, 0x5f]}}, &(0x7f0000001780)=""/204, 0x85, 0xcc, 0x0, 0x401}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x8, 0x1b, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4bd}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0xa4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @ldst={0x2, 0x2, 0x4, 0x2, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='syzkaller\x00', 0x20, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x10, '\x00', r9, 0x7, r10, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000001900)=[r4, r0, r0, r6], 0x0, 0x10, 0x5}, 0x90) executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) mount(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000140)='proc\x00', 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0xfffffe2e, 0x0, 0x0, 0x0) setresuid(0x0, 0xee00, 0xffffffffffffffff) setfsuid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000080)='map_files\x00') fchdir(r4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = dup3(r1, r6, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)=@setlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x4}}}]}, 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x37}}) r8 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\xbe\xaen/\xce4\xb7\xc1\xef\xba!\x9d\rSt\xa24\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1dz\xd05\xe2e,\xb1\x84\xea\x91^%A\xe5\x9e\x13TdT\xc6^p\xb0#R\x04\x06\xae\xebA;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6\xb4\v\xff\xfc\x88\x90\xabC\x02\x00\xf04\x03\x88\xae9\'>R^P{Vr!\xe2W\xc72\xea\xb7Wp\xc36\x96\xffZ\\A@\x00\x00\x00\xc9\xf3Y\xb8\x89#\xa1\xb1)Dk\xeb\xa1\t\x00{u[\xbd\x9d\xf4\xbf\\\xce\x02P\xf2MY\x05^\xffj\x9c\x14\xb7\xb6v\x1d*1>\x00 \x00\x00\x00\x00\x14C?]\x8c\xb4Y\xcf\x80\x85\xd6\x036\xc8~\xa8\f\x00\x00\xb5M\x9a\x9dc\xaaAU\xec\xe06\xed\xe4\xfb\xdf\a\xd0lg\x13\xf9\x8b:s>\xd7s\xef\xb3\x9f#\x15)\xf9\xe10\xc7\xb262\x00\x00\x00\x00\x00\x00\x00\x00Nz\x0eu\x8f\x01\x00\x00\x00\x00\x00\x00\xdd\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc3\xa7/\x0f\x9b`\xa5\x98\x81a\xeev\x00\x00\x00\x00\a\x10\x00m2\xf2\xd8,\x17\xf8\x8e\xae\xc8\xad\xed<\"\x8e\n\x9d\xb13\x8d\xef\x96\xd2I\"8=tg\xdfU\xd0q\x95/f\xec\xdc\xa3\xe1[\xc0\xaa\xefz\xc9\xf4[\x00\x00\x00Q\xff}5\x94\x88\xa1\xdc\xa1g\xe0q\xc5:\xe4\xdf\x80\xb3,\xb9\xb2\xdc\x81\x9f6\x0f\x84WY\xbfSY`\xb8\a\x19\xb1\x058\xa4\xc3\xbb\xf8aB:\x84\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3o-GU\xb0\x00F\xb3o(aI[\xd6\x9fG\xaeI\x83\x93\x8cC\xc0#\xe0q\xd0Ex|\xdb\xa8\x16\xfe>:\t0\xfd\x8a\xc7\x84\xb5\xc7M-0A\xf0\x94\xf3\xcc\x8d\xbb3\\\"\x882\xb3\xa84\xac\x00\xdd}Ft\xc6\xcc\f}1X#\xe4\xe1\x94i\xce\xa1\xff\x95\x80\xb4T\x9c\x01\xf3\x1cLB\x94m(m\f\xbc\xebY\xa0\xf7\xf0\x9d\x10\xbd\x86\x1by\xe6\xdf\xc0\xc5\xb9\xb9\xbf\xdf~9\nC\xe9\xc5\x0e\xda\x9c(\x9b\"\xc7\x97\xfc\b\xd9\xc2T\xa7*}]\xc8\xb3 .\x9b\x89\x0f\xf8$\xdd>lU\x13EG\xbb1] \xda\x19\xc5\x9b\x15\x95\xc4\xfcw\xbb\x92\x91\xc4\xa6\x907XK\xfc\x17]\xfa\xff\'\xef\x92\x1c\xb8\x1fK\xb2o \xd1\xbd\xb2\x11+\xa3R\xefQ\xc2\xbdW\x05\xec\xb3=@\x03\xc6^\xa2\x15%\xb0\'D#\xb6Q\x8f\x82?S>\x0fP\x9cE\x92{d\xe6\x9cj1\x87\xb3\x01\xde\xe8\x89\xc4s\xb7\x14~}\xaa\x8c\xc3\x95BAE\xf2.\x8f#;a\x94\"\xd1U\xff\xe8v\xd3\x84d\xf4\x134\xa6XI\xe5h\xaa\x15\x9a\xf7Z\xe3%\x88p\x90\xbb\x9dt\xa3\xe1\r\x8d\x94\"\x19\x8b\x17)\xea\xd5\x17\xeb\xe4\x1b\x0fBZ1\xbe\xee\xfa\x1c\xf9\xa6\x11\x94\x06\\P:\xaf\xcex\xc2\x82\x9a\x16\xfc\xa1\xf9q\x12\xe3\x1a\xdc\xb7\x12\xbba\b\xbb\xed\xb2\xd1W\xe2\x8b\x8d8}\x10W\xbd\xa60A\xc3\x03\xfa\x890\x86#\bQ\xcb)\x00]\x9e\x14\xd2\xea\x82\xa8\xb7ZG\x15r\xf1\t\x00\x00\x00 \xc1\xaf\x19?\x00\\\x91\x13\x1b8\xe1\xc3\xa4\v\x94\xbfJ\xb5\xde\x95\x82\x00]B|\xe2[%\xe3\xf0\x04\xba\xed\xdb\xf5\x7f\x9d\xfe>\xf6m$M&\x7fq]\xe4\xf6\x82\xc3\x00\xb1zg}\x99E\xa4\x19\xe9\x1a4a\xd75D-k\x84\xa6\x12+\xebk\xa1\xfek\x89\xef\x18\xc1)6\xa65\xe2D\xbe\xe1\xdfq\xdd68\xf37g\xab9m\xe7\xddO\v?\xe0\xbe}\xa9U\xc7{\xd3\x16W\xbb\xe5\xd2\x93\xfe\xa4\x9d\r$\xe91c8`\x86\xbc)\xe29\xc3}\xb9P\xd5F\xc6\x12\x8c_x\xa8\xfa\xb5K\x03\x85\x93k\xe1\x8e\x1f)\".\xcc\'\v\xa6\x1bj\\\n\xe98yA\xd8T\x85\x80A\xcbo\x99\x99\xeb)r\x1a\xce\x18(\x185LL\xbcOeO\'\xe2\x86&\xe4\xe2\xe7~\x92\xa2\xb2\x1b\xc3\x00\x85\xce\xad7\x87\xa0\xfcc\xf5\xf8\xaf\v,q\xd4\x18\xbdM\x1a\xde\xba*L\x05m6\xecH\xd0T\xb8m\xdb\b\xa6\x02\xfb\x13\xac\x91\x8a\x8d\x94\x93\x8d=\xb1\x84\x9c\x9b\xe5\xc7\xa6\xc9Q\xc1eUc\xcc\x180^\x00\x00\x00\x00\x00\x00\x00\x00\xe7]6+\\\x00\x00\x00\x00?#C.\x1dj\xd9\xc3\xdd&\x80g:N\xec\x06[\x8f\x92\xe2\xb01\xb0\xef\x10,\xde\xf3\x86D\x8b\xf7\xf1>AH\xef\\\xf9\x8b\a\xe0\xb2\xcb\xf0\x97\b\r\xd5`\xb9\xd6\xa4\x1e\xbe\x12-}\xc5\x84\xde@\x18\x87\f\x01O\xedS\x8f\x9en,\xbce\xb2\xe4\x82v\x1c\xed\x84-s\xab\x06b\x9c\xba\xec\xa5\xc9A\x84\xd0\xe0 S\xc8\xa2\xaf\x85\v\xad\xa5\x88\xcf\xb6}`\x14\'\xea\xbfN\xac)\xa1\xe8\xb2\x9f\x112TJ\x16\x8c9\xe9\xf5\x18\x15Dd\x8a%>\x91\x93\x88\xe9\x18\x82]\x9e&\xfa\xaa\xfa8Z2\x00'/1301, 0x0) fcntl$setstatus(r8, 0x4, 0x42800) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b0, 0x2e0, 0x9403, 0x3002, 0x6602, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) r9 = syz_io_uring_setup(0x279, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x60e6, &(0x7f0000000280), &(0x7f0000000300)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r11, r10, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r9, 0x3701, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xb) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r4, 0x100, 0x0) getdents(r4, &(0x7f0000002380)=""/102, 0x66) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x5, &(0x7f0000000200)=[{0x401, 0x7f, 0x1f, 0x8}, {0x8, 0x8, 0x8, 0x1}, {0x2b6, 0x13, 0x54, 0x40}, {0x0, 0xff, 0x3, 0x5}, {0x9, 0x80, 0x5, 0x8}]}, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000140)=ANY=[], 0x28}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x8000000, 0x0, 0x0, 0x40f00}, 0x90) writev(0xffffffffffffffff, 0x0, 0x0) r5 = socket(0x11, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfefc) r6 = accept(r5, &(0x7f0000000180)=@llc, &(0x7f0000000040)=0x80) fcntl$dupfd(r6, 0x406, r2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(r5, 0x107, 0x13, 0x0, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x34}}, 0x0) ioperm(0x0, 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) bind$can_raw(r0, &(0x7f00000000c0), 0x10) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x10) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000100)="acfd4331", 0x4}, {&(0x7f0000000200)="e5974f3c00b2c515931fb6d33f46d4e47db5612a6282df6791c7c81d92c14d1230e9540a5199", 0x26}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000000000000000000080014bf", @ANYRES32=0x0, @ANYBLOB="ac141428e000000100000000140000000000000000000000070000004404250000000000"], 0x38}, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) open(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, &(0x7f0000000040)=ANY=[], 0x3, 0x7a6, &(0x7f0000000a80)="$eJzs3U9sHGcVAPA3Jk5SV4qqgkoUpekkKVIiUnd3nbpYPZTteuxMu961dtcoEUJt1DiVFaetWlXQHCi5tIBAiBPH0mvVCzcQEkgcgBMSPXDhgFSpJ1QQCARCSEEzu47/2/ljJ235/azuNzv75pv3zW7n7Wx2ZgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAiKQxWalUk2jmrbmz6eYak532zBaPL/X3y1XNFuuNSIr/Yv/+ONifdfBzyw8/UNwci8P9e4djf9Hsjyv3PnDfE5/dM7S0/BYJ3aqjNxiXRHyrSOrS+cXF+Vd2IZE76Ls/v+lF/n2tuJ3OWnm3nc/Up7M077bTifHxyqNnprrpVN7Muue6vWwmbXSyeq/d2Tt4ZsfSbPRce641PVlvZumJxsm0OjHx+CO1SmU8fXp0Nqt3uu3Wo0+Pdhtn8mYzb02XMbXK16OIebx4IT6T99JeVp9J04sLi/Nj26VaBFVXzdm36oVz+OH7Pnztg78vzBcvyM06SQbp16rVWq06/tjEY49XKntqldrqGZU14npEDEUUEbvyouUTZGd23LADhgb1P5qRRyvm4mykkcZQebv8NxyNmIxOtGOmuP+H4TWPr6v/X3j0L7/bar0r6/9SlT+4/PChKOv/kf69I5vV/3VZ3P7f6QOb9dp6r5/NynmvxutxJS7F+ViMxZiPV3Yhox39G9rZ/qYji1bk0Y125DET9XJOOpiTxkSMx3hU4tk4E1PRjTSmIo9mZNGNc9GNXmTlK6oRnciiHr1oRyfSOBGNOBlpVGMiJmIs0shiNM5FO+aiFdMxGfWyl4uxUG73sTV5PfDN5372wu8/fLuYvh5U3WIgSfFmrgj62xZB68r9TdT/pQj1/9Nm/2CfdaPxO7n7httyraz/e+52GgAAAMAuSspP35OIGI4Hy6mpvJl99W6nBQAAAOyg8nvNh4tmuJh6MJLi+L+yQeT7dzw3AAAAYGck5Tl2SUSMxEP9qaXTpTb6EAAAAAD4BCr//f9I0YxEvFHOcPwPAAAAnzLf3uwa+x/sHVxjtzu7L/nFX6PTGU6uzp59OLlcL+Lqlz/TX27QfOV6j72pQ8mBQSdlM77nyr1JROxpZIeTpatf/ndfv/2ovD20fAHCza71n2yTQGydQHkvvhdH+zFHL/TbC0uP9NcyMpU3s9FGu/lENRl8ONJ77cWFb0Q5/O+0Zg4kcXFhcX70+ZcWL5S5XC16uXp5cHn45CZyuTbYAvHgxiMeLk/EGKx3pL/eysrxD/UXH9p6ncnKdb4Zx/oxx0b67cjq8e8v1lkdfaIa9fqBoV52tvfatRWjH2RRvc2RvxnH+zHHTxzvNxtkUVuVxYvrs6itzGLttvjH0G1l8fbRN87+89ftJBvbLouxrbK4gW0BcLf0r/qzXIXuKavQf671FfV/Td29Z2nJm9nLXVx+l7G0/Ipatyd2prq/GSf6MSf67yf2HNqgrlQ22KO/vPDybwZ79NPv/ujHXzvy25/cenV7N072YwZN3P+rTWpsMebvr6mq7xRLvLPpervNWhLD/d8+KFx5ZOHy+RfmX5h/sVYbG6+crlQeq8Vw+VZh0Kg9AGxg+9/Y2TYiOb3NUfX9179SMBrPx0uxGBfiVHm2QUQ8tHGvIyu+hnBqm6PWkRW/8HJqm2PL5dja2th9x5PYJHZsxRb7/A/L5l+795wAwG47tk0dvpH6f2qb4+7Vtfxk/4dzl46OY/NavpEv7fYGAYD/A1nno2Sk91bS6eSzz1YnJqr13pks7bQbz6SdfHI6S/NWL+s0ztRb01k622n32o2lD44ns27anZudbXd66VS7k862u/nZ8pff08FPv3ezmXqrlze6s82s3s3SRrvVqzd66WTebaSzc0818+6ZrFMu3J3NGvlU3qj38nYr7bbnOo1sNE27WbYiMJ/MWr18Ki8mW+lsJ5+pd65GRHNuJksns26jk8/22v0Ol9aVt6banZmy29H1w//znd7eAPBx8OrrVy6dX1ycf+XWJv54I8F3e4wAwGqqNAAAAAAAAAAAAAAAfPytP12vmHtTJwIOxy2fPvjqvridsw8/NRNLz8aVL743mNiBnm+nn3tWPad7B+nd/Q110xPPPfnkpc1innrj4Jk/ZRHb97Px/ykbner61oGIvT/9QX/Ol+/USN+PGxnFuolryRYxd2NvBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABb+18AAAD//zDnU/I=") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_getevents(0x0, 0x3, 0x0, &(0x7f0000000400), 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021740000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000004800038044000080080003400000000238000b80340001800a0001"], 0xf8}}, 0x0) executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c\x87\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x700) [ 148.314397][ T8898] __nla_validate_parse: 29 callbacks suppressed [ 148.314412][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.330053][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.339356][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.358143][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.367495][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.376916][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, 0x0) connect$pppl2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x2, &(0x7f0000005280)) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070000000000000004000000181100004697d5911e1e6e4cc6832452cf3f5fa3943795adb682aa60224ac329161b6c2b84d4db7bd1cc15bb2085c40e02", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000008fe000400000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000180)=""/116, 0x41000, 0x14, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x5, 0xa, 0x9}, {0x5, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x4, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x5, 0x3, 0x2}, {0x1, 0x1, 0xe, 0x8}, {0x0, 0x4, 0xc, 0x6}]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r2}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r8, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r12, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) [ 148.405474][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.414816][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 148.424091][ T8898] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340)={0x42, 0x3}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e1f}, 0x10) listen(r3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) executing program 4: ftruncate(0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000000)=0x7, 0x4) (async) sendto$unix(r1, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000000c0)=""/182, 0xb6, 0x10100, 0x0, 0x0) (async) socket$packet(0x11, 0x0, 0x300) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000061500000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, 0x0, 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 1: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x60, '\x00', r0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffe9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f0000000140)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xa, 0x13, 0x20, 0xbc, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4d}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f00000003c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r3}, @exit], &(0x7f0000000480)='syzkaller\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, 0x19, 0x0}}, 0x10) sendmsg$NFT_BATCH(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000d80)=ANY=[@ANYBLOB="0c0000001000010000000000000000000000000a240000000c0a01010000000000000000000000000900010073797a31000000000400038020000000050a01020000000000000000000000000900010073797a3100000000140000001100010000000000000000000000000a"], 0x6c}}, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r8}, @IFLA_HSR_SLAVE2={0x8, 0x2, r10}, @IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x3}]}}}]}, 0x48}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x4000080}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x24, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r10}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x24044004) r11 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r11, 0x80811501, 0x0) write$P9_RVERSION(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r12 = dup(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000ff0000000000000200000c0095f1ffffff"], 0x0, 0x63e1b59c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) dup(r1) write$P9_RLERRORu(r12, &(0x7f0000000040)=ANY=[@ANYBLOB="5300000007000046009ce6e7e68cce73"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d32c4fa8a320899e1d1d3e00002df3ec6a8c8", @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r12, @ANYBLOB=',k']) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r1}, 0x10) unshare(0x42000000) unshare(0x60040d00) executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) r2 = fsopen(0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}]) [ 148.999020][ T8920] 9pnet_fd: Insufficient options for proto=fd executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x70}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$netlink(0x10, 0x3, 0xe) syz_emit_ethernet(0x14, &(0x7f0000000080)=ANY=[@ANYBLOB="a8aaaaaaaaaabbbbbbbbbbbb8100000088a88ad9"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x32600) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00'}) unshare(0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002080)=""/4096, 0x1000) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x30) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) r1 = syz_clone(0x8080, &(0x7f0000000cc0), 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000001680)={0x0, 0x80, 0x9, 0x7f, 0x1, 0x9, 0x0, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001640), 0x1}, 0x870, 0x7fff, 0x3, 0x5, 0x3, 0x7, 0x7, 0x0, 0x40, 0x0, 0xa00000}, 0xffffffffffffffff, 0xc, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdfd}, 0x48) syz_clone(0x10044000, &(0x7f0000001700)="4edbfadb33b1d6fdf4a38d285960427ad84ff4851cfb783cd330de5b4f489125a9e5122bab5cc4f78bed641231254ebc7b621d7b3a4132b380843400c7eef5657a7d8001e2b141abd0756265f8041d5dfbc7c1e522ce26d3338c6cb447a3fd94c684b480d8ca24da4b64998af460f1d59c4068a697dce98fb745c1080b92020ace26a7064451cab56c45048e4aaed05968cc9e55ca0a985ed85deafb776aaea22f29e93d16038d73f0dc19b6d09fce148f05a0b4d8c3ea6350bcbd98a34b5a9e10b5bcb52a92fcd982bf5f0150f13928d11c", 0xd2, &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000001800)="2393dc230810e66c93075ebabc10dc8f8aa81b53054d9557778ae6b4273ce72ed7817a83742698fc646001abbdd32e7a74b96100596ab4276a75d324692029078aa55da7c3b122df3cc3377df60a06b6b5c417232fb6e05560") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0xffffffff, 0xe, 0xe, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x496}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) r4 = epoll_create1(0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0x2def, 0x0, 0x0, 0x0, 0x0) executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000043, &(0x7f0000000000)={[{@auto_da_alloc_val}]}, 0xa, 0x501, &(0x7f0000000140)="$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") setgroups(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000004e80)=ANY=[@ANYBLOB="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"/4699], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x2007, 0x7f, @loopback, 0x800}], 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) fsopen(&(0x7f0000000000)='bpf\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) symlinkat(&(0x7f0000000040)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000016c0)=ANY=[@ANYBLOB="85000000a0000000350000000054f36b550000002a0000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca47ce33647282102c7b4dba77c8ea9b6ee1398ae73749be1537086ae214b64880106f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dc4535c5eb2672b4fa56387ee22e9cf11ad8101ffb0f5530ca8f33b4d3ce79e89ac0905744c500000054299ffd9762b9110ff58cda5cf566f06b6683eae1b41e5183e3f40e30f79e8c4afb7203e71a4d92a37874eab7e2b8296e3ab3009286337eed9787ec75fb6bfcf00d85df7b59419690f9c00796e2dd75a527a6b93fbee41c998f6096b369350f7140712335de4f5492bbe16949cc1a066d6805548760d20000000000000000000000000000c04b1d32fa1c1da2d02b7df4bda7c0882cf97e1aa666e66e62fac83a52acf29d8ebdba51b0ea43f2e227ffcb167ca855d243980a61d9c6e2afa7d8b3231d7f2224296af9f1725df12807016b26eb8613b6d6d8bfbf1928e9172fd5691699ae77ad39d91e505ffd89bcc271043da6266effe9b0b8c056989d8b1c0e6010c105ab3cf09bd40c2d363a1c057bba78b90cc094974e6d85db1626319086bddf2a28e542c18053749ce3e186c163f341d419c548a7b75495f63644502aac0b629a0edba4b88381bee37a6bd2bd924e785e53f05b878517e18a505e7d3161a313763c1e154fe0f0c34dcf0ec54c4df698b1ebee8ba3d4feb5614f4571ac9ecaf6c331b1bd82f897668f341bffdcb7867043314c809c46584a2ab0"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x44, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x84a}, 0x28) executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(r0, &(0x7f0000000440)='blkio.bfq.time\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000002a00000045000000a400020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r1}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="60010000100013070000000000000000ac1414120000000000000000000000000a0101000000000000000000000000000000fffc000000000000800000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000002b000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000094070000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000a00000000000000000000004c0012"], 0x160}}, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r3, 0x400448e1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f00000005c0)={0x1f, 0x0, 0x4}, 0x6) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800379e2ff6afe4f228e52f0652310000b70300010000008385000000710000009500000000000000ff085d0f2285ecd242666c2d382144903998268aa62d58aa57fa631d53c1bde191a834845d6b"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000580)='mm_page_free\x00', r5}, 0x4) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080), 0xfd32) bind$bt_hci(r4, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff001, 0x1, @perf_config_ext, 0x6acd6b06fdb4df0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)=0x4c8, 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) getsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000300), &(0x7f0000000340)=0x4) r8 = openat$cgroup_int(r7, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB='1-6:5'], 0x31) sendto$inet6(r6, &(0x7f0000000300), 0x48, 0x0, 0x0, 0xfffffffffffffdfd) socket$nl_netfilter(0x10, 0x3, 0xc) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='ip_vti0\x00', 0x10) r9 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x80, 0x3, 0x2, 0x4, 0x0, 0x0, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000380), 0x4}, 0x2000, 0x800, 0xfffff800, 0x0, 0xa2, 0xe64, 0x8, 0x0, 0x80000000, 0x0, 0x7}, r0, 0x7, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r9, 0x2402, 0x4f8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) mount(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000140)='proc\x00', 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0xfffffe2e, 0x0, 0x0, 0x0) setresuid(0x0, 0xee00, 0xffffffffffffffff) (async) setfsuid(0x0) (async) r4 = syz_open_procfs(r3, &(0x7f0000000080)='map_files\x00') fchdir(r4) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) (async) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = dup3(r1, r6, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)=@setlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x4}}}]}, 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x37}}) (async) r8 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\xbe\xaen/\xce4\xb7\xc1\xef\xba!\x9d\rSt\xa24\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1dz\xd05\xe2e,\xb1\x84\xea\x91^%A\xe5\x9e\x13TdT\xc6^p\xb0#R\x04\x06\xae\xebA;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6\xb4\v\xff\xfc\x88\x90\xabC\x02\x00\xf04\x03\x88\xae9\'>R^P{Vr!\xe2W\xc72\xea\xb7Wp\xc36\x96\xffZ\\A@\x00\x00\x00\xc9\xf3Y\xb8\x89#\xa1\xb1)Dk\xeb\xa1\t\x00{u[\xbd\x9d\xf4\xbf\\\xce\x02P\xf2MY\x05^\xffj\x9c\x14\xb7\xb6v\x1d*1>\x00 \x00\x00\x00\x00\x14C?]\x8c\xb4Y\xcf\x80\x85\xd6\x036\xc8~\xa8\f\x00\x00\xb5M\x9a\x9dc\xaaAU\xec\xe06\xed\xe4\xfb\xdf\a\xd0lg\x13\xf9\x8b:s>\xd7s\xef\xb3\x9f#\x15)\xf9\xe10\xc7\xb262\x00\x00\x00\x00\x00\x00\x00\x00Nz\x0eu\x8f\x01\x00\x00\x00\x00\x00\x00\xdd\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc3\xa7/\x0f\x9b`\xa5\x98\x81a\xeev\x00\x00\x00\x00\a\x10\x00m2\xf2\xd8,\x17\xf8\x8e\xae\xc8\xad\xed<\"\x8e\n\x9d\xb13\x8d\xef\x96\xd2I\"8=tg\xdfU\xd0q\x95/f\xec\xdc\xa3\xe1[\xc0\xaa\xefz\xc9\xf4[\x00\x00\x00Q\xff}5\x94\x88\xa1\xdc\xa1g\xe0q\xc5:\xe4\xdf\x80\xb3,\xb9\xb2\xdc\x81\x9f6\x0f\x84WY\xbfSY`\xb8\a\x19\xb1\x058\xa4\xc3\xbb\xf8aB:\x84\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3o-GU\xb0\x00F\xb3o(aI[\xd6\x9fG\xaeI\x83\x93\x8cC\xc0#\xe0q\xd0Ex|\xdb\xa8\x16\xfe>:\t0\xfd\x8a\xc7\x84\xb5\xc7M-0A\xf0\x94\xf3\xcc\x8d\xbb3\\\"\x882\xb3\xa84\xac\x00\xdd}Ft\xc6\xcc\f}1X#\xe4\xe1\x94i\xce\xa1\xff\x95\x80\xb4T\x9c\x01\xf3\x1cLB\x94m(m\f\xbc\xebY\xa0\xf7\xf0\x9d\x10\xbd\x86\x1by\xe6\xdf\xc0\xc5\xb9\xb9\xbf\xdf~9\nC\xe9\xc5\x0e\xda\x9c(\x9b\"\xc7\x97\xfc\b\xd9\xc2T\xa7*}]\xc8\xb3 .\x9b\x89\x0f\xf8$\xdd>lU\x13EG\xbb1] \xda\x19\xc5\x9b\x15\x95\xc4\xfcw\xbb\x92\x91\xc4\xa6\x907XK\xfc\x17]\xfa\xff\'\xef\x92\x1c\xb8\x1fK\xb2o \xd1\xbd\xb2\x11+\xa3R\xefQ\xc2\xbdW\x05\xec\xb3=@\x03\xc6^\xa2\x15%\xb0\'D#\xb6Q\x8f\x82?S>\x0fP\x9cE\x92{d\xe6\x9cj1\x87\xb3\x01\xde\xe8\x89\xc4s\xb7\x14~}\xaa\x8c\xc3\x95BAE\xf2.\x8f#;a\x94\"\xd1U\xff\xe8v\xd3\x84d\xf4\x134\xa6XI\xe5h\xaa\x15\x9a\xf7Z\xe3%\x88p\x90\xbb\x9dt\xa3\xe1\r\x8d\x94\"\x19\x8b\x17)\xea\xd5\x17\xeb\xe4\x1b\x0fBZ1\xbe\xee\xfa\x1c\xf9\xa6\x11\x94\x06\\P:\xaf\xcex\xc2\x82\x9a\x16\xfc\xa1\xf9q\x12\xe3\x1a\xdc\xb7\x12\xbba\b\xbb\xed\xb2\xd1W\xe2\x8b\x8d8}\x10W\xbd\xa60A\xc3\x03\xfa\x890\x86#\bQ\xcb)\x00]\x9e\x14\xd2\xea\x82\xa8\xb7ZG\x15r\xf1\t\x00\x00\x00 \xc1\xaf\x19?\x00\\\x91\x13\x1b8\xe1\xc3\xa4\v\x94\xbfJ\xb5\xde\x95\x82\x00]B|\xe2[%\xe3\xf0\x04\xba\xed\xdb\xf5\x7f\x9d\xfe>\xf6m$M&\x7fq]\xe4\xf6\x82\xc3\x00\xb1zg}\x99E\xa4\x19\xe9\x1a4a\xd75D-k\x84\xa6\x12+\xebk\xa1\xfek\x89\xef\x18\xc1)6\xa65\xe2D\xbe\xe1\xdfq\xdd68\xf37g\xab9m\xe7\xddO\v?\xe0\xbe}\xa9U\xc7{\xd3\x16W\xbb\xe5\xd2\x93\xfe\xa4\x9d\r$\xe91c8`\x86\xbc)\xe29\xc3}\xb9P\xd5F\xc6\x12\x8c_x\xa8\xfa\xb5K\x03\x85\x93k\xe1\x8e\x1f)\".\xcc\'\v\xa6\x1bj\\\n\xe98yA\xd8T\x85\x80A\xcbo\x99\x99\xeb)r\x1a\xce\x18(\x185LL\xbcOeO\'\xe2\x86&\xe4\xe2\xe7~\x92\xa2\xb2\x1b\xc3\x00\x85\xce\xad7\x87\xa0\xfcc\xf5\xf8\xaf\v,q\xd4\x18\xbdM\x1a\xde\xba*L\x05m6\xecH\xd0T\xb8m\xdb\b\xa6\x02\xfb\x13\xac\x91\x8a\x8d\x94\x93\x8d=\xb1\x84\x9c\x9b\xe5\xc7\xa6\xc9Q\xc1eUc\xcc\x180^\x00\x00\x00\x00\x00\x00\x00\x00\xe7]6+\\\x00\x00\x00\x00?#C.\x1dj\xd9\xc3\xdd&\x80g:N\xec\x06[\x8f\x92\xe2\xb01\xb0\xef\x10,\xde\xf3\x86D\x8b\xf7\xf1>AH\xef\\\xf9\x8b\a\xe0\xb2\xcb\xf0\x97\b\r\xd5`\xb9\xd6\xa4\x1e\xbe\x12-}\xc5\x84\xde@\x18\x87\f\x01O\xedS\x8f\x9en,\xbce\xb2\xe4\x82v\x1c\xed\x84-s\xab\x06b\x9c\xba\xec\xa5\xc9A\x84\xd0\xe0 S\xc8\xa2\xaf\x85\v\xad\xa5\x88\xcf\xb6}`\x14\'\xea\xbfN\xac)\xa1\xe8\xb2\x9f\x112TJ\x16\x8c9\xe9\xf5\x18\x15Dd\x8a%>\x91\x93\x88\xe9\x18\x82]\x9e&\xfa\xaa\xfa8Z2\x00'/1301, 0x0) fcntl$setstatus(r8, 0x4, 0x42800) (async) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b0, 0x2e0, 0x9403, 0x3002, 0x6602, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) r9 = syz_io_uring_setup(0x279, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) (async) syz_io_uring_setup(0x60e6, &(0x7f0000000280), &(0x7f0000000300)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r11, r10, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) (async) io_uring_enter(r9, 0x3701, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xb) executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x30, 0x1a, 0x1, 0x0, 0x25dfdbfb, {0x1c, 0x0, 0x20}, [@RTA_VIA={0x14, 0x12, {0x10, "7629e9889c89610c389b6c4129fa"}}]}, 0x30}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x1000, 0x7, 0x1f, 0x0, 0x40, 0x1ff}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x2, 0x800, 0x10001, 0x9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a80)=ANY=[@ANYBLOB="050000000000000089111600000000008510000002000000850000000500000095000000000000009500a5050000000052c217cf4cc8a37c12b8bbbebe6d364367617740904b4f84c54cda22462974013d5a0170ead8c63e194e6822d1cab34cedd8d717061d318988afbe4734332fa2c1b029c93b653be83859360732b395d647b6e28f2c7e50d89d86e6b9cef564903dc5b70d6465432936d1907d595e586071fb5ec1681616c345b3913a862ed4b4d7662df9c2bb187057a40a2fd187c44e1aac63d697"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r2, 0x0, r2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x127e, 0xffffffffffffffff) [ 149.450607][ T8933] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 149.481428][ T8936] loop4: detected capacity change from 0 to 512 [ 149.517456][ T8936] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 149.536605][ T8936] EXT4-fs (loop4): orphan cleanup on readonly fs [ 149.543115][ T8936] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 7, max 0(0), depth 0(0) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x20}}, 0x0) setresuid(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}) bind$netlink(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f000001f000)=""/4091, 0xffb}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) io_uring_setup(0x30d3, &(0x7f00000002c0)) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250c0000000c009900038000003400000002000000000000006b4cec58b8b6694a04ffffffffffffff7fa1b29a89d3cf94e972c31cf13e2d62af020e7e4a6326e5645a5158205e4472aca8545a6818f59ff1da2e217292c0ba648af5c342259a95c0a885b771ef12e0b96991f94061df4ec00a34fa4b22515eacb37ebaa85226c3913b2ba13a8414c5c5f4e681d0ca051491114b3b040a42897a4e4fa847700222c337495ee67fa2fbd165f63466fd5c676958934114be1b66b78e0ed9fabde921afd5460c02bcbfbcde82769aff14b0c5c03a4800"/240], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x40801) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x85, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) executing program 0: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r1}, 0x48) (async) r3 = socket(0x2b, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) listen(r3, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)={0x17be11}) (async) r5 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r5, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x3, [{0x5, 0x2, 0x2}], "491eaf"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "d5"}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000006c0)=""/50, 0x46, 0x32, 0x1}, 0x20) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$unix(0x1, 0x2, 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) (async) open(&(0x7f0000022ff6)='./file0\x00', 0x8000, 0x0) (async) socket$rxrpc(0x21, 0x2, 0xa) (async) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) (async) r6 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x4011, r6, 0x0) poll(&(0x7f0000000100)=[{r4}], 0x1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r8, &(0x7f0000000200)={0x1f, 0xffffffffffffffff}, 0x6) close_range(r7, 0xffffffffffffffff, 0x0) (async) close(r0) socket$kcm(0x10, 0x5, 0x0) (async) socket$igmp(0x2, 0x3, 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc8080, 0x0) [ 149.562270][ T8936] EXT4-fs error (device loop4): ext4_quota_enable:7063: comm syz-executor.4: Bad quota inode: 3, type: 0 [ 149.573678][ T8936] EXT4-fs warning (device loop4): ext4_enable_quotas:7104: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 149.588484][ T8936] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 149.595397][ T8936] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x51) write$cgroup_pid(r4, &(0x7f00000005c0), 0x10) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x5, 0x8, 0x9, 0x40, 0x0, 0x8001, 0x80200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x7fffffff}, 0x0, 0x5, 0x5ee, 0x2, 0x8, 0x5, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffab8}, 0x0, 0x7, r1, 0x2) r5 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9f) mkdirat$cgroup(r2, &(0x7f0000000240)='syz0\x00', 0x1ff) executing program 0: r0 = timerfd_create(0x0, 0x0) read$eventfd(r0, &(0x7f0000001880), 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x200000b, 0x12, r1, 0x0) ftruncate(r1, 0x8001) pidfd_getfd(r1, r1, 0x0) (async) pidfd_getfd(r1, r1, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) (async) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = dup3(r0, r0, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9, 0x21}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x48000) socket$inet(0x2, 0x6, 0x769) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x80, 0x30e0, 0x1ff}, 0x1}, 0x20, 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000200)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @empty, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) rseq(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1, 0x80000001, 0x40, 0x4}, 0x4}, 0x20, 0x1, 0x0) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x400800, 0x80) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300)=""/191, &(0x7f00000003c0)=0xbf) r6 = openat$cgroup_ro(r0, &(0x7f0000000400)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000440)=0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x5, '\x00', 0x0, r2, 0x1, 0x0, 0x5}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001680)={'team0\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x62, 0x62, 0x9, [@datasec={0xb, 0x7, 0x0, 0xf, 0x2, [{0x4, 0x8, 0x1ff}, {0x4, 0x9, 0x1c70}, {0x3, 0x7, 0x7}, {0x5, 0x2c8b, 0x80}, {0x2, 0x4, 0xd3}, {0x2, 0x4, 0x4}, {0x1, 0x2, 0x101}], 'g;'}]}, {0x0, [0x0, 0x5f, 0x30, 0x5f, 0x2e, 0x2e, 0x5f]}}, &(0x7f0000001780)=""/204, 0x85, 0xcc, 0x0, 0x401}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x8, 0x1b, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4bd}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0xa4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x1, 0x1, 0x0, r8}, @ldst={0x2, 0x2, 0x4, 0x2, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='syzkaller\x00', 0x20, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x10, '\x00', r9, 0x7, r10, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000001900)=[r4, r0, r0, r6], 0x0, 0x10, 0x5}, 0x90) [ 149.643765][ T3116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x74, 0x2}, @ramp}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) readv(r0, 0x0, 0x0) write$char_usb(r1, &(0x7f0000000040)="e2", 0x1068) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x2, &(0x7f0000000240)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0x28}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x473a47520000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}]}, 0x2c}}, 0x0) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A\xc4\a\x9e\xbd\xa2\xfb\rD\xefq\x1f!\x01\xc3\xa5U\x98\xee\xcd;A\xe8\x00~V\xbf\xd4\x00\xd2,7\xa0\xfd7\xe8\xf9M\x02\xec\f3\xd4\xb8\xc3\x85\xda\xeb\xce7y%S\x1e\xa9\xe9\x92!\x95\xf1Ek\x95\x9bQ\x1d\xa4\xc2\xbb\xfa\x96\x14\x7f\xb9\x90\x9cn\xb5\x10\xd2\x84\xe9\x9e1\x9a\x9e\xa7\x9e\xcd\x1a\x86\x14%\xbaS\x90\xb1j\xf9\x00\xd7@D\x04\xaa\xb55\xd8x?z\xff\x85j3\xbe\axo\x05)\xcc\xcd\x9b\xb3\xe7w\x0e\x9f\xd3\aU\xf0M\xc1\xad\x17t\xeb\x1b\x11m\xec\x00\x00\x00\x00R\xb6v\x88\a\x82\x9e\x00\x00\x00\x10\x00\x00\x00\xa6!\xb3\xa8\xe7[&\x165\x84\xce\xa5\xc4wT\xf2E\tj\x92G\x14\x04\x93\xa4\xba\xcb\xce\"Y\xd68\xeb\x01\xc9/\x19\x85\xc6\x8do\xcb\x17\xb5\xffW\xe6\x8a\xfb\a\xf6', 0x2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xff9d) sendfile(r0, r1, &(0x7f0000000100), 0x2) fcntl$addseals(r1, 0x409, 0x0) fchown(r1, 0x0, 0x0) executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600006c00000000000690780a210104ac1414aa070b04030e00002465028c440c8023ffff49dcd4f298d8cf02670a010100ac141420e0000001bc670376f33a15d9ac14141764010100ac14143ee0000002e00000010b00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c0000009078"], 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1032, 0xffffffffffffffff, 0x10000000) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x9, 0x100) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0xff, 0xb8, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x1, 0x80, 0x3, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf25090000000800030000000000050005000000000048000180060001000200000014000400fe8000000000000000000000000000aa08000300e0000001050002000000000008000700", @ANYBLOB="050002004000000008000300ac1414bb080002000300000008000200020000001400068008000300ffffffff08000300ac1414bb3c000680060005004e220000060005004e20000008000300ac1414bb080003000a01010008000700", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="0500020000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x10000000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x13, r7, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000040)) executing program 0: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x0, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0xab}]}, 0x1c}}, 0x0) write$UHID_CREATE2(r3, &(0x7f00000002c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x300000e, 0x2172, 0xffffffffffffffff, 0x0) r4 = socket(0x1e, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000000)={0xa0179e12}) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000080)) epoll_wait(r5, &(0x7f0000001080)=[{}], 0x1, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x74, 0x49, 0x300, 0x70bd25, 0x25dfdbfe, {0xa, 0x0, 0x10, 0x0, 0x0, 0xd49d}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @mcast2}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x10) fstatfs(r4, &(0x7f00000000c0)=""/90) executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x25}, {0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x7f, &(0x7f0000000100)) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) io_submit(0x0, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)="7f", 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}]) executing program 0: syz_emit_ethernet(0x7a, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_REMOVE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e200e227f000001925aa80020007b0009008003000000000000000000ff0000f03ac71002000000fffffffffeffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002140)={&(0x7f0000002100)='ext4_load_inode\x00', r0}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0xa, 0x922000000003, 0x11) r4 = socket$kcm(0x10, 0x2, 0x4) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@deltclass={0x30, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x6, 0xffe2}, {0xb, 0x8}, {0xffff}}, [@tclass_kind_options=@c_taprio={0xb}]}, 0x30}, 0x1, 0xed02}, 0x0) sendmsg$kcm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_9p2000}], [{@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\'\\^&]/]\'%,/-\\'}}]}}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="6c0000007d5d649d4b5450860f734a517ca5d0b724751f1933abafe348c89b17fcfeef710173dfae98c895dd5cb21f4b8a724bd543e83910b716dfb591d6adccadbe84c0229a7e03c5d4f8d06cc912c37847693e7e958f0e2ee887d8c86eb47373b9dc22840d0b997510271b54cc711b7e66", @ANYRES16=r5, @ANYBLOB="0100000000000000000003000000580001800d0001007564703a73797a320000000044000400200001000a0000000000000000000000000000000000ffff7f00000100000000200002000a00000000000000ff02000000000000000000000000000100000000"], 0x6c}}, 0x0) r8 = socket$can_raw(0x1d, 0x3, 0x1) r9 = fcntl$dupfd(r8, 0x0, r8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x31, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001040000000000007f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008573e786e73207f5ab4e4a825f67230a0000000600000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009128f4ff0800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018000000f9ffffff0000000005000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0xdc, &(0x7f0000000500)=""/220, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6d, 0x80000000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x0, 0x5, 0xe, 0x3}, {0x1, 0x3, 0x5, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x5, 0x2, 0x3, 0x8}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0x5}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'wg0\x00', 0x4000}) setsockopt$CAN_RAW_FILTER(r9, 0x65, 0x5, 0x0, 0x4) ioperm(0x0, 0x9, 0x20) executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x7) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1a58ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000ff030000000000000000711097000000000095000011fffff800"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, 0x9}, 0x90) (async) r3 = syz_io_uring_setup(0x7335, &(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000700)) (async) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003880), 0x200000, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000003ac0)=[r4], 0x1) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 64) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') read$qrtrtun(r7, &(0x7f00000004c0)=""/57, 0x39) pwritev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000300)="e3b1ed39ac10d6da4ca5a755ba202149cfb4a5b960acabc0be0c70ff72bfb0e96439578147e0817949ba825461316a0e39c40cc4d3ac1c2eff7d5430c5426730fe5d12f970e22a61019b5097986ee426b7d56215e8f8123be26be053d654c3c5de4e7a870886e1de74b71eb5eb8500325841c9ecec1f1144e6d3693fc5ef2e3e0e", 0x81}], 0x1, 0x0, 0x0) (async, rerun: 64) write$binfmt_aout(r2, &(0x7f00000002c0)=ANY=[], 0xc1) (async, rerun: 64) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r2, 0x0) r8 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r8, 0x10d, 0xf0, 0x0, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)="ae", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[{0x18, 0x84, 0x5, "10"}], 0x18}}], 0x2, 0x0) [ 155.244344][ C1] ================================================================== [ 155.252456][ C1] BUG: KCSAN: data-race in next_expiry_recalc / update_process_times [ 155.260522][ C1] [ 155.262839][ C1] write to 0xffff888237d1de98 of 8 bytes by interrupt on cpu 0: [ 155.270460][ C1] next_expiry_recalc+0x187/0x1e0 [ 155.275480][ C1] __run_timer_base+0x2ee/0x640 [ 155.280332][ C1] timer_expire_remote+0x2f/0x40 [ 155.285278][ C1] tmigr_handle_remote+0x4ee/0x910 [ 155.290392][ C1] run_timer_softirq+0x5f/0x70 [ 155.295164][ C1] __do_softirq+0xc8/0x285 [ 155.299582][ C1] irq_exit_rcu+0x3c/0x90 [ 155.303901][ C1] sysvec_apic_timer_interrupt+0x73/0x80 [ 155.309533][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 155.315509][ C1] __tsan_read8+0x42/0x180 [ 155.319922][ C1] __fput+0x366/0x660 [ 155.323905][ C1] __fput_sync+0x44/0x60 [ 155.328140][ C1] __se_sys_close+0x101/0x1b0 [ 155.332807][ C1] __x64_sys_close+0x1f/0x30 [ 155.337397][ C1] x64_sys_call+0x25b9/0x2d30 [ 155.342075][ C1] do_syscall_64+0xcd/0x1d0 [ 155.346581][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.352469][ C1] [ 155.354781][ C1] read to 0xffff888237d1de98 of 8 bytes by interrupt on cpu 1: [ 155.362317][ C1] update_process_times+0x8a/0x180 [ 155.367430][ C1] tick_nohz_handler+0x250/0x2d0 [ 155.372370][ C1] __hrtimer_run_queues+0x214/0x5e0 [ 155.377561][ C1] hrtimer_interrupt+0x210/0x7b0 [ 155.382502][ C1] __sysvec_apic_timer_interrupt+0x5c/0x1a0 [ 155.388391][ C1] sysvec_apic_timer_interrupt+0x6e/0x80 [ 155.394028][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 155.400007][ C1] acpi_safe_halt+0x21/0x30 [ 155.404508][ C1] acpi_idle_do_entry+0x1d/0x30 [ 155.409366][ C1] acpi_idle_enter+0x96/0xb0 [ 155.413958][ C1] cpuidle_enter_state+0xcf/0x270 [ 155.418985][ C1] cpuidle_enter+0x40/0x70 [ 155.423401][ C1] do_idle+0x195/0x230 [ 155.427468][ C1] cpu_startup_entry+0x25/0x30 [ 155.432230][ C1] start_secondary+0x94/0xa0 [ 155.436813][ C1] common_startup_64+0x12c/0x137 [ 155.441745][ C1] [ 155.444058][ C1] value changed: 0x00000000ffffc747 -> 0x00000000ffffc748 [ 155.451150][ C1] [ 155.453464][ C1] Reported by Kernel Concurrency Sanitizer on: [ 155.459594][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 [ 155.469208][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 155.479248][ C1] ==================================================================