7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) [ 59.190378][ T2779] loop1: p1 p2 p3 13:00:41 executing program 5: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x11}, 0x48) 13:00:41 executing program 4: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:41 executing program 2: r0 = fsopen(&(0x7f00000003c0)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='^-^\x00', &(0x7f0000000340)='\x00', 0x0) 13:00:41 executing program 0: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x2, 0x313, 0xa, 0x148, 0x340, 0x10, 0x478, 0x2a8, 0x2a8, 0x478, 0x2a8, 0x3, 0x0, {[{{@ip={@loopback=0x7f002911, @dev, 0x0, 0x0, 'team_slave_1\x00', 'nr0\x00'}, 0x0, 0x2f8, 0x340, 0x0, {0x20000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00'}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={{0x40}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x570) 13:00:41 executing program 5: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x11}, 0x48) 13:00:41 executing program 2: r0 = fsopen(&(0x7f00000003c0)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='^-^\x00', &(0x7f0000000340)='\x00', 0x0) 13:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x2, 0x313, 0xa, 0x148, 0x340, 0x10, 0x478, 0x2a8, 0x2a8, 0x478, 0x2a8, 0x3, 0x0, {[{{@ip={@loopback=0x7f002911, @dev, 0x0, 0x0, 'team_slave_1\x00', 'nr0\x00'}, 0x0, 0x2f8, 0x340, 0x0, {0x20000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00'}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={{0x40}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x570) 13:00:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x12, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x38}}, 0x0) [ 59.296272][ T3895] udevd[3895]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 59.317607][ T3688] udevd[3688]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 59.327641][ T3893] udevd[3893]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory 13:00:41 executing program 2: r0 = fsopen(&(0x7f00000003c0)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='^-^\x00', &(0x7f0000000340)='\x00', 0x0) 13:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x2, 0x313, 0xa, 0x148, 0x340, 0x10, 0x478, 0x2a8, 0x2a8, 0x478, 0x2a8, 0x3, 0x0, {[{{@ip={@loopback=0x7f002911, @dev, 0x0, 0x0, 'team_slave_1\x00', 'nr0\x00'}, 0x0, 0x2f8, 0x340, 0x0, {0x20000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00'}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={{0x40}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x570) [ 59.385929][ T4742] loop1: detected capacity change from 0 to 8192 [ 59.402116][ T4746] loop0: detected capacity change from 0 to 8192 [ 59.425971][ T4749] loop4: detected capacity change from 0 to 8192 13:00:41 executing program 1: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) [ 59.436847][ T4746] loop0: p1 p2 p3 [ 59.436847][ T4742] loop1: p1 p2 p3 [ 59.448611][ T4749] loop4: p1 p2 p3 13:00:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) 13:00:41 executing program 4: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:41 executing program 0: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x2, 0x313, 0xa, 0x148, 0x340, 0x10, 0x478, 0x2a8, 0x2a8, 0x478, 0x2a8, 0x3, 0x0, {[{{@ip={@loopback=0x7f002911, @dev, 0x0, 0x0, 'team_slave_1\x00', 'nr0\x00'}, 0x0, 0x2f8, 0x340, 0x0, {0x20000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00'}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={{0x40}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x570) 13:00:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x12, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x38}}, 0x0) 13:00:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) 13:00:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x12, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x38}}, 0x0) 13:00:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) [ 59.524826][ T3895] udevd[3895]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 59.538603][ T3688] udevd[3688]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 59.552326][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory 13:00:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) 13:00:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x12, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x38}}, 0x0) 13:00:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) [ 59.681086][ T4775] loop1: detected capacity change from 0 to 8192 [ 59.689708][ T4777] loop0: detected capacity change from 0 to 8192 [ 59.712429][ T4783] loop4: detected capacity change from 0 to 8192 [ 59.736596][ T4777] loop0: p1 p2 p3 [ 59.737408][ T4775] loop1: p1 p2 p3 [ 59.748791][ T4783] loop4: p1 p2 p3 13:00:42 executing program 1: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) 13:00:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x2}, 0x8f) 13:00:42 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 0: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:42 executing program 4: syz_read_part_table(0x103c, &(0x7f0000001040)="$eJzszjEOQUEYhdE7iEwlswRqq/i1apVNWILEWjQ2p1BLRK+W95Jz6pubL8zS8X15JdftLrdaJD1pPUmN3A/7bEZy/s5qmWet00ay+vFyevy/HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACm5xMAAP//1hgIrg==") syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000ffdbdf2501000000080032008000000008002c0000010000050038000000000008000b003e0f000008003c00ff070000050037000100000008002b000900800005002a000000000008003c0001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280), r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}}, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=@ipv6_getnetconf={0x2c, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x400}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffb}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd441}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41517f18f97c4463}, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100029bd7000fcdbdf250100000008000b0040000000050035004000000008003c007f000000060028000400000008003b000080000008000b0009000000050033000100000008000500330000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0228bd7000fedbdf250d00000008000b000100000008003a0004000000", @ANYRES32=0x0, @ANYBLOB="9e1b263f36da2ba7713a7d032a1299a72c9e08761d91b12f638f1e64c9c622cd410e903c22fec13669092a15319ec0b90600a2acd48d5429aa55e97c50783056ad1f498fb39dddc2771d8655238ea2c1b05253c38f1084027d2e009c7e65061ae290352a3ed011df800a50166e8e5d4318c187466427b247ac68ec490773885e84cc2cb5fa528d81008e32baab8a8994f2850475aa54ab7b15c30e25409cdb369d8ef44b31a0d34603698e11b06573b70a41e83c95bc"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4005000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x66}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}}, 0x40c9) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48857}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xfffffffffffffe07, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x314, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c810}, 0x2000015) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 13:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000440)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @LWT_BPF_XMIT={0xc, 0x8, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x6, 0x2, '.\x00'}}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x40}}, 0x0) 13:00:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 13:00:42 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000440)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @LWT_BPF_XMIT={0xc, 0x8, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x6, 0x2, '.\x00'}}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x40}}, 0x0) [ 59.895573][ T4801] No such timeout policy "syz0" 13:00:42 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="850000002a00000047000000000000009500000000000000aecd48d6494d61fa3ad84e77de52a57cd7014cad29674dcc6fab5335ec470d2db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e2d0f41c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000dd0000804015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970e45c93cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea5080000000cdcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e1184dabfe62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a560087009561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12289ee34463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d447bb75e12d1d8e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700ab6407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c8c3f46f4f25ffb6d85e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45dbeea042f9b33393f85a0417854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da755611f26a186cb7ee86dd4285c4721eb428c953296ac2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e63a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e958e2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc00000b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33afd96844d526bb387a3f6251b97e98a3604cec07f2be1d1f020be23a0047d06f39e9da6a94120d854be97a179d19ec699f3e63f54c7c2adccf8bee00a09157ea3ae03339409543619e33c743a4656d2863fdbdeeb5b6632d94a37d7787d6acf7c04ea69bbd92834818886c7e00ddd0c1381b5d7a30f4a2461f93f2203a38a9c31dd8c3929af7aad1c59b5359bc76e591e78a65dfd2c23a287b098e64cba84a698e3ed3a7b00b12086a0a987885c19e39e8c411b602f543666c84ef13b7dde3d30dd399f4fb6d0b0c9a99fcf47d71778d2d416856623387c5e886162e8abac08d709c075e03f04357d2bfe890a90e03ab9a9d000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000440)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @LWT_BPF_XMIT={0xc, 0x8, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x6, 0x2, '.\x00'}}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x40}}, 0x0) [ 59.925894][ T4797] loop0: detected capacity change from 0 to 8192 [ 59.976689][ T4802] loop4: detected capacity change from 0 to 8192 [ 59.986726][ T4797] loop0: p1 p2 p3 [ 60.033846][ T4802] loop4: p1 p2 p3 [ 60.049329][ T4808] loop1: detected capacity change from 0 to 8192 [ 60.060615][ T2779] loop4: p1 p2 p3 [ 60.096520][ T4808] loop1: p1 p2 p3 13:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000440)=@ipv6_newnexthop={0x40, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @LWT_BPF_XMIT={0xc, 0x8, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x6, 0x2, '.\x00'}}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x40}}, 0x0) 13:00:42 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="850000002a00000047000000000000009500000000000000aecd48d6494d61fa3ad84e77de52a57cd7014cad29674dcc6fab5335ec470d2db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e2d0f41c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000dd0000804015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970e45c93cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea5080000000cdcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e1184dabfe62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a560087009561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12289ee34463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d447bb75e12d1d8e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700ab6407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c8c3f46f4f25ffb6d85e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45dbeea042f9b33393f85a0417854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da755611f26a186cb7ee86dd4285c4721eb428c953296ac2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e63a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e958e2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc00000b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33afd96844d526bb387a3f6251b97e98a3604cec07f2be1d1f020be23a0047d06f39e9da6a94120d854be97a179d19ec699f3e63f54c7c2adccf8bee00a09157ea3ae03339409543619e33c743a4656d2863fdbdeeb5b6632d94a37d7787d6acf7c04ea69bbd92834818886c7e00ddd0c1381b5d7a30f4a2461f93f2203a38a9c31dd8c3929af7aad1c59b5359bc76e591e78a65dfd2c23a287b098e64cba84a698e3ed3a7b00b12086a0a987885c19e39e8c411b602f543666c84ef13b7dde3d30dd399f4fb6d0b0c9a99fcf47d71778d2d416856623387c5e886162e8abac08d709c075e03f04357d2bfe890a90e03ab9a9d000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 60.138467][ T2779] loop1: p1 p2 p3 13:00:42 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 5: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000180)={@map=0x1, 0x0, 0x1b, 0x0, &(0x7f00000001c0)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 60.180546][ T3895] udevd[3895]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 60.181745][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 60.193736][ T3688] udevd[3688]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 60.202816][ T4824] loop1: detected capacity change from 0 to 512 [ 60.213501][ T3893] udevd[3893]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 60.279511][ T4824] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.321472][ T4824] ext4 filesystem being mounted at /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 60.344669][ T27] kauditd_printk_skb: 17 callbacks suppressed [ 60.344683][ T27] audit: type=1400 audit(1702040442.589:220): avc: denied { write } for pid=4822 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 60.374233][ T4824] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents [ 60.374873][ T27] audit: type=1400 audit(1702040442.589:221): avc: denied { add_name } for pid=4822 comm="syz-executor.1" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 60.420043][ T27] audit: type=1400 audit(1702040442.589:222): avc: denied { create } for pid=4822 comm="syz-executor.1" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 60.427475][ T4824] EXT4-fs error (device loop1): ext4_dirty_inode:5965: inode #2: comm syz-executor.1: mark_inode_dirty error [ 60.468133][ T4824] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents [ 60.480656][ T4824] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 60.496152][ T4824] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 3: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 60.527626][ T4824] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 12: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 60.555244][ T4824] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 13: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 60.593624][ T4824] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 14: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 13:00:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 13:00:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x10) write(r0, &(0x7f0000000040)="240000001a00010001000000000004018000000001000800000000000800020040000000", 0x24) 13:00:42 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:42 executing program 5: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000180)={@map=0x1, 0x0, 0x1b, 0x0, &(0x7f00000001c0)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) 13:00:42 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="850000002a00000047000000000000009500000000000000aecd48d6494d61fa3ad84e77de52a57cd7014cad29674dcc6fab5335ec470d2db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e2d0f41c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000dd0000804015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970e45c93cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea5080000000cdcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e1184dabfe62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a560087009561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12289ee34463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d447bb75e12d1d8e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700ab6407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c8c3f46f4f25ffb6d85e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45dbeea042f9b33393f85a0417854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da755611f26a186cb7ee86dd4285c4721eb428c953296ac2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e63a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e958e2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc00000b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33afd96844d526bb387a3f6251b97e98a3604cec07f2be1d1f020be23a0047d06f39e9da6a94120d854be97a179d19ec699f3e63f54c7c2adccf8bee00a09157ea3ae03339409543619e33c743a4656d2863fdbdeeb5b6632d94a37d7787d6acf7c04ea69bbd92834818886c7e00ddd0c1381b5d7a30f4a2461f93f2203a38a9c31dd8c3929af7aad1c59b5359bc76e591e78a65dfd2c23a287b098e64cba84a698e3ed3a7b00b12086a0a987885c19e39e8c411b602f543666c84ef13b7dde3d30dd399f4fb6d0b0c9a99fcf47d71778d2d416856623387c5e886162e8abac08d709c075e03f04357d2bfe890a90e03ab9a9d000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) [ 60.602692][ T27] audit: type=1400 audit(1702040442.839:223): avc: denied { create } for pid=4822 comm="syz-executor.1" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 60.622945][ T4824] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 15: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 13:00:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x10) write(r0, &(0x7f0000000040)="240000001a00010001000000000004018000000001000800000000000800020040000000", 0x24) 13:00:42 executing program 5: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000180)={@map=0x1, 0x0, 0x1b, 0x0, &(0x7f00000001c0)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 60.687291][ T27] audit: type=1400 audit(1702040442.889:224): avc: denied { read write open } for pid=4822 comm="syz-executor.1" path="/root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0/file2" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 13:00:42 executing program 5: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000180)={@map=0x1, 0x0, 0x1b, 0x0, &(0x7f00000001c0)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) 13:00:43 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 13:00:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) 13:00:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x10) write(r0, &(0x7f0000000040)="240000001a00010001000000000004018000000001000800000000000800020040000000", 0x24) 13:00:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 60.713497][ T4824] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 16: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 60.744057][ T4852] No such timeout policy "syz0" [ 60.772465][ T3099] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.782846][ T4855] No such timeout policy "syz0" [ 60.831182][ T4858] loop4: detected capacity change from 0 to 512 [ 60.841210][ T4860] loop1: detected capacity change from 0 to 512 [ 60.858301][ T4860] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.872708][ T4858] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.881519][ T4860] ext4 filesystem being mounted at /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 60.895048][ T4858] ext4 filesystem being mounted at /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 60.932789][ T4860] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents [ 60.959413][ T4860] EXT4-fs error (device loop1): ext4_dirty_inode:5965: inode #2: comm syz-executor.1: mark_inode_dirty error [ 60.997603][ T4860] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents [ 61.019254][ T4858] EXT4-fs error (device loop4): ext4_do_update_inode:5105: inode #2: comm syz-executor.4: corrupted inode contents [ 61.042115][ T4860] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 61.061055][ T4858] EXT4-fs error (device loop4): ext4_dirty_inode:5965: inode #2: comm syz-executor.4: mark_inode_dirty error [ 61.090116][ T4858] EXT4-fs error (device loop4): ext4_do_update_inode:5105: inode #2: comm syz-executor.4: corrupted inode contents [ 61.098965][ T4860] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 3: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 61.103492][ T4858] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 61.157670][ T4858] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 3: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 61.185278][ T4858] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 12: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 61.186703][ T4860] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 12: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 61.213297][ T4858] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 13: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 61.310177][ T4860] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 13: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 13:00:43 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 13:00:43 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) fchown(r0, 0x0, 0x0) 13:00:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x10) write(r0, &(0x7f0000000040)="240000001a00010001000000000004018000000001000800000000000800020040000000", 0x24) [ 61.347188][ T4858] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 14: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 61.381745][ T4860] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 14: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 61.431116][ T4858] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 15: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 13:00:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 61.480383][ T4860] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 15: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 61.515338][ T4878] loop0: detected capacity change from 0 to 512 13:00:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 61.532626][ T4876] No such timeout policy "syz0" [ 61.541656][ T4860] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 16: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/105/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 61.554541][ T4881] loop2: detected capacity change from 0 to 512 [ 61.575950][ T4858] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 16: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 13:00:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) 13:00:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 61.622176][ T4878] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 61.652276][ T4881] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 61.667170][ T4881] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/106/file0 supports timestamps until 2038-01-19 (0x7fffffff) 13:00:43 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 61.684658][ T4878] ext4 filesystem being mounted at /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 61.704450][ T3133] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.715981][ T4881] EXT4-fs error (device loop2): ext4_do_update_inode:5105: inode #2: comm syz-executor.2: corrupted inode contents [ 61.744418][ T3099] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.755002][ T4878] EXT4-fs error (device loop0): ext4_do_update_inode:5105: inode #2: comm syz-executor.0: corrupted inode contents [ 61.771680][ T4881] EXT4-fs error (device loop2): ext4_dirty_inode:5965: inode #2: comm syz-executor.2: mark_inode_dirty error [ 61.798482][ T4881] EXT4-fs error (device loop2): ext4_do_update_inode:5105: inode #2: comm syz-executor.2: corrupted inode contents [ 61.826519][ T4888] No such timeout policy "syz0" [ 61.866547][ T4881] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #2: comm syz-executor.2: mark_inode_dirty error [ 61.871970][ T4891] loop4: detected capacity change from 0 to 512 [ 61.878372][ T4878] EXT4-fs error (device loop0): ext4_dirty_inode:5965: inode #2: comm syz-executor.0: mark_inode_dirty error [ 61.888426][ T4892] loop1: detected capacity change from 0 to 512 [ 61.896398][ T4878] EXT4-fs error (device loop0): ext4_do_update_inode:5105: inode #2: comm syz-executor.0: corrupted inode contents [ 61.926593][ T4881] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 3: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 61.968928][ T4891] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 61.985280][ T4878] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error [ 61.986699][ T4891] ext4 filesystem being mounted at /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/117/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 62.013608][ T4881] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 12: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 62.027932][ T4892] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 62.077442][ T4881] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 13: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 62.106380][ T4892] ext4 filesystem being mounted at /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/106/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 62.131924][ T4878] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 3: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 62.160738][ T4878] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 12: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 62.172991][ T4891] EXT4-fs error (device loop4): ext4_do_update_inode:5105: inode #2: comm syz-executor.4: corrupted inode contents [ 62.207520][ T4878] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 13: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 62.233625][ T4881] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 14: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 62.260438][ T4892] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents [ 62.283036][ T4892] EXT4-fs error (device loop1): ext4_dirty_inode:5965: inode #2: comm syz-executor.1: mark_inode_dirty error [ 62.289943][ T4878] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 14: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 62.301256][ T4891] EXT4-fs error (device loop4): ext4_dirty_inode:5965: inode #2: comm syz-executor.4: mark_inode_dirty error [ 62.321649][ T4878] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 15: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 62.338549][ T4881] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 15: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 62.357738][ T4878] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 16: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/116/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 62.358819][ T4892] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents 13:00:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 62.358907][ T4892] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 62.423161][ T4891] EXT4-fs error (device loop4): ext4_do_update_inode:5105: inode #2: comm syz-executor.4: corrupted inode contents [ 62.458305][ T4892] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 3: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 13:00:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 62.484556][ T4902] No such timeout policy "syz0" 13:00:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 62.510717][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.521826][ T4891] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 62.535218][ T4892] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 12: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 62.589711][ T4891] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 3: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 62.615604][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.644548][ T4892] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 13: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/106/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 62.688794][ T4891] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 12: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 62.711047][ T4907] loop0: detected capacity change from 0 to 512 13:00:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 62.743009][ T4907] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 62.760296][ T4891] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 13: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 62.797939][ T4907] ext4 filesystem being mounted at /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/117/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 62.808340][ T3099] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.840553][ T4911] loop2: detected capacity change from 0 to 512 [ 62.861766][ T4891] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 14: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 13:00:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 62.896089][ T4907] EXT4-fs error (device loop0): ext4_do_update_inode:5105: inode #2: comm syz-executor.0: corrupted inode contents [ 62.933661][ T4911] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 62.947397][ T4907] EXT4-fs error (device loop0): ext4_dirty_inode:5965: inode #2: comm syz-executor.0: mark_inode_dirty error [ 62.979016][ T4907] EXT4-fs error (device loop0): ext4_do_update_inode:5105: inode #2: comm syz-executor.0: corrupted inode contents [ 63.012721][ T4911] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 63.033047][ T4916] loop1: detected capacity change from 0 to 512 [ 63.034315][ T4907] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error 13:00:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 63.059420][ T4917] No such timeout policy "syz0" [ 63.077742][ T4911] EXT4-fs error (device loop2): ext4_do_update_inode:5105: inode #2: comm syz-executor.2: corrupted inode contents [ 63.092874][ T3133] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 63.104977][ T4907] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 3: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 63.141264][ T4916] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 63.157947][ T4907] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 12: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 63.189436][ T4911] EXT4-fs error (device loop2): ext4_dirty_inode:5965: inode #2: comm syz-executor.2: mark_inode_dirty error [ 63.192486][ T4916] ext4 filesystem being mounted at /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/107/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 63.222330][ T4911] EXT4-fs error (device loop2): ext4_do_update_inode:5105: inode #2: comm syz-executor.2: corrupted inode contents [ 63.230650][ T4907] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 13: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 63.266734][ T4911] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #2: comm syz-executor.2: mark_inode_dirty error [ 63.301180][ T4916] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents [ 63.331751][ T4911] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 3: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 63.339743][ T4924] loop4: detected capacity change from 0 to 512 [ 63.370876][ T4907] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 14: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 63.371046][ T4916] EXT4-fs error (device loop1): ext4_dirty_inode:5965: inode #2: comm syz-executor.1: mark_inode_dirty error [ 63.446634][ T4911] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 12: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 63.447096][ T4916] EXT4-fs error (device loop1): ext4_do_update_inode:5105: inode #2: comm syz-executor.1: corrupted inode contents 13:00:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$eJzs3c9vHFcdAPDvjH82TesEeoAKSIBCQFF2400bVb20uYBQVQlRcUAcUmNvLJNdr/GuS20s4f4NIIHECf4EDkgckHriwI0jEgeEVA5IASxQjATSopkdO1t7TZbsepd6Px9pMvPmzcz3vWxm39u3m3kBTKyrEbEXEbMR8VZELBT7k2KJ1zpLdtzD/d3lg/3d5STa7Tf/muT52b7oOifzdHHN+Yj42pcjvpWcjNvc3rm/VKtVN4t0uVXfKDe3d26s1ZdWq6vV9Url9uLtmy/feqkytLpeqf/8wZfWXv/6r375yfd/u/fF72XFuljkdddjmDpVnzmKk5mOiNfPItgYTBXr2TGXgyeTRsRHIuIz+f2/EFP5v04A4DxrtxeivdCdBgDOuzQfA0vSUkSkadEJKHXG8J6LC2mt0Wxdv9fYWl/pjJVdipn03lqtevPy3O+/kx88k2TpxTwvz8/TlWPpWxFxOSJ+OPdUni4tN2or4+nyAMDEe7q7/Y+If8ylaanU16k9vtUDAD405sddAABg5LT/ADB5tP8AMHn6aP+LL/v3zrwsAMBo+PwPAJNH+w8Ak0f7DwAT5atvvJEt7YPi+dcrb29v3W+8fWOl2rxfqm8tl5Ybmxul1UZjNX9mT/1x16s1GhuLL8bWO+VWtdkqN7d37tYbW+utu/lzve9WZ0ZSKwDgv7l85b3fJRGx98pT+RJdczloq+F8S8ddAGBspgY5WQcBPtTM9gWTq68mPO8k/ObMywKMR8+Hec/33PygH/8PQfzOCP6vXPt4/+P/5niG88X4P0yuJxv/f3Xo5QBGz/g/TK52Ozk+5//sURYAcC4N8BO+9veH1QkBxupxk3kP5ft/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOGcuRsS3I0lL+VzgafZnWipFPBMRl2ImubdWq96MiGfjSkTMzGXpxXEXGgAYUPrnpJj/69rCCxeP584m/5zL1xHx3Z+8+aN3llqtzcVs/9+O9s8dTh9WeXTeAPMKAgBDlrfflWLd9UH+4f7u8uEyyvI8uBP/LqYiXj7Y382XTs50ZDsj5vO+xIW/JzFdnDMfEc9HxNQQ4u+9GxEf61X/JB8buVTMfNodP4rYz4w0fvqB+Gme11lnna+PDqEsMGneuxMRr/W6/9K4mq973//z+TvU4B7c6Vzs8L3voCv+dBFpqkf87J6/2m+MF3/9lRM72wudvHcjnp/uFT85ip+cEv+FPuP/4ROf+sGrp+S1fxpxLXrH745VbtU3ys3tnRtr9aXV6mp1vVK5vXj75su3XqqU8zHq8uFI9Ul/eeX6s6eVLav/hVPiz/es/+zRuZ/rs/4/+9db3/z0o+Tc8fhf+Gzv1/+5nvE7sjbx833GX7rwi1On787ir5xS/8e9/tf7jP/+n3ZW+jwUABiB5vbO/aVarbo50Eb2KXQY1zmxkRWxv4MPu4uDBf1jnEUtnnBj5qz+Vs98Y/qorzjcK38ju+KIq5MOvRYDbTwcVazxvScBo/Hoph93SQAAAAAAAAAAAAAAgNOM4r8ujbuOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CQAA//+zi8zo") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 63.473787][ T4911] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 13: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 63.513205][ T4911] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 14: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 63.546836][ T4907] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 15: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/117/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 63.574578][ T4928] loop3: detected capacity change from 0 to 512 [ 63.581097][ T4916] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 63.595563][ T4911] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 15: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 13:00:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 63.629131][ T4911] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 16: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 63.670425][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:00:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 63.689636][ T4924] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 63.715688][ T4924] ext4 filesystem being mounted at /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/118/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 63.731595][ T4928] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 63.770263][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 63.797249][ T4916] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 3: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 63.822575][ T4928] ext4 filesystem being mounted at /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/102/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 63.838957][ T4934] loop0: detected capacity change from 0 to 512 [ 63.850241][ T4924] EXT4-fs error (device loop4): ext4_do_update_inode:5105: inode #2: comm syz-executor.4: corrupted inode contents [ 63.870066][ T4916] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 12: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 63.904989][ T4924] EXT4-fs error (device loop4): ext4_dirty_inode:5965: inode #2: comm syz-executor.4: mark_inode_dirty error [ 63.924295][ T4934] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 63.924416][ T4937] loop2: detected capacity change from 0 to 512 [ 63.937190][ T4934] ext4 filesystem being mounted at /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/118/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 63.963098][ T4924] EXT4-fs error (device loop4): ext4_do_update_inode:5105: inode #2: comm syz-executor.4: corrupted inode contents [ 63.982941][ T4916] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 13: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 64.011207][ T4924] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 64.027588][ T4928] EXT4-fs error (device loop3): ext4_do_update_inode:5105: inode #2: comm syz-executor.3: corrupted inode contents [ 64.039821][ T4916] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 14: comm syz-executor.1: path /root/syzkaller-testdir3584013606/syzkaller.jxuNXE/107/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 64.067984][ T4934] EXT4-fs error (device loop0): ext4_do_update_inode:5105: inode #2: comm syz-executor.0: corrupted inode contents [ 64.086791][ T4924] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 3: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 64.116970][ T4928] EXT4-fs error (device loop3): ext4_dirty_inode:5965: inode #2: comm syz-executor.3: mark_inode_dirty error [ 64.130305][ T4937] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.156443][ T4928] EXT4-fs error (device loop3): ext4_do_update_inode:5105: inode #2: comm syz-executor.3: corrupted inode contents 13:00:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) 13:00:46 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 64.157657][ T4934] EXT4-fs error (device loop0): ext4_dirty_inode:5965: inode #2: comm syz-executor.0: mark_inode_dirty error [ 64.170126][ T4937] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.195109][ T4944] loop5: detected capacity change from 0 to 512 [ 64.202190][ T4934] EXT4-fs error (device loop0): ext4_do_update_inode:5105: inode #2: comm syz-executor.0: corrupted inode contents [ 64.217544][ T4928] EXT4-fs error (device loop3): __ext4_ext_dirty:202: inode #2: comm syz-executor.3: mark_inode_dirty error [ 64.217688][ T3099] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.229190][ T4934] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error [ 64.249994][ T4924] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 12: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 64.282355][ T4928] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 3: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/102/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 64.310386][ T4934] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 3: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 64.322644][ T4944] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.349145][ T4924] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 13: comm syz-executor.4: path /root/syzkaller-testdir1949819546/syzkaller.5pz8kk/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 64.352551][ T4944] ext4 filesystem being mounted at /root/syzkaller-testdir183854782/syzkaller.4AZerW/119/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.400674][ T4937] EXT4-fs error (device loop2): ext4_do_update_inode:5105: inode #2: comm syz-executor.2: corrupted inode contents [ 64.414117][ T4928] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 12: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/102/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 64.441162][ T4934] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 12: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 64.448888][ T4944] EXT4-fs error (device loop5): ext4_do_update_inode:5105: inode #2: comm syz-executor.5: corrupted inode contents 13:00:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 64.473166][ T4952] No such timeout policy "syz0" [ 64.506043][ T3133] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.518657][ T4937] EXT4-fs error (device loop2): ext4_dirty_inode:5965: inode #2: comm syz-executor.2: mark_inode_dirty error [ 64.554102][ T4934] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 13: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 64.576660][ T4928] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 13: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/102/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 64.608097][ T4937] EXT4-fs error (device loop2): ext4_do_update_inode:5105: inode #2: comm syz-executor.2: corrupted inode contents [ 64.620602][ T4944] EXT4-fs error (device loop5): ext4_dirty_inode:5965: inode #2: comm syz-executor.5: mark_inode_dirty error [ 64.634216][ T4937] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #2: comm syz-executor.2: mark_inode_dirty error [ 64.634280][ T4934] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 14: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 64.650476][ T4928] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 14: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/102/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 64.672598][ T4944] EXT4-fs error (device loop5): ext4_do_update_inode:5105: inode #2: comm syz-executor.5: corrupted inode contents [ 64.705383][ T4955] No such timeout policy "syz0" [ 64.713001][ T4934] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 15: comm syz-executor.0: path /root/syzkaller-testdir4130524534/syzkaller.F7wGt3/118/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 13:00:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 64.743318][ T4937] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 3: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 64.774507][ T3117] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.775587][ T4944] EXT4-fs error (device loop5): __ext4_ext_dirty:202: inode #2: comm syz-executor.5: mark_inode_dirty error 13:00:47 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 64.796721][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.806637][ T4937] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 12: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 64.822577][ T4944] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 3: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/119/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 64.839250][ T4937] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 13: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 64.887689][ T4937] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 14: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 64.899563][ T4958] loop3: detected capacity change from 0 to 512 [ 64.915523][ T4937] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 15: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 64.929695][ T4944] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 12: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/119/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 64.973461][ T4944] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 13: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/119/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 64.988526][ T4937] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 16: comm syz-executor.2: path /root/syzkaller-testdir3552779997/syzkaller.tGMep6/108/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653245223, rec_len=1, size=2048 fake=0 [ 65.025372][ T4944] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 14: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/119/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 65.032955][ T4964] No such timeout policy "syz0" [ 65.058226][ T4944] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 15: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/119/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 65.067316][ T4958] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 13:00:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) [ 65.110007][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.159411][ T4958] ext4 filesystem being mounted at /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/103/file0 supports timestamps until 2038-01-19 (0x7fffffff) 13:00:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) 13:00:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$eJzs3c9vHFcdAPDvjH82TesEeoAKSIBCQFF2400bVb20uYBQVQlRcUAcUmNvLJNdr/GuS20s4f4NIIHECf4EDkgckHriwI0jEgeEVA5IASxQjATSopkdO1t7TZbsepd6Px9pMvPmzcz3vWxm39u3m3kBTKyrEbEXEbMR8VZELBT7k2KJ1zpLdtzD/d3lg/3d5STa7Tf/muT52b7oOifzdHHN+Yj42pcjvpWcjNvc3rm/VKtVN4t0uVXfKDe3d26s1ZdWq6vV9Url9uLtmy/feqkytLpeqf/8wZfWXv/6r375yfd/u/fF72XFuljkdddjmDpVnzmKk5mOiNfPItgYTBXr2TGXgyeTRsRHIuIz+f2/EFP5v04A4DxrtxeivdCdBgDOuzQfA0vSUkSkadEJKHXG8J6LC2mt0Wxdv9fYWl/pjJVdipn03lqtevPy3O+/kx88k2TpxTwvz8/TlWPpWxFxOSJ+OPdUni4tN2or4+nyAMDEe7q7/Y+If8ylaanU16k9vtUDAD405sddAABg5LT/ADB5tP8AMHn6aP+LL/v3zrwsAMBo+PwPAJNH+w8Ak0f7DwAT5atvvJEt7YPi+dcrb29v3W+8fWOl2rxfqm8tl5Ybmxul1UZjNX9mT/1x16s1GhuLL8bWO+VWtdkqN7d37tYbW+utu/lzve9WZ0ZSKwDgv7l85b3fJRGx98pT+RJdczloq+F8S8ddAGBspgY5WQcBPtTM9gWTq68mPO8k/ObMywKMR8+Hec/33PygH/8PQfzOCP6vXPt4/+P/5niG88X4P0yuJxv/f3Xo5QBGz/g/TK52Ozk+5//sURYAcC4N8BO+9veH1QkBxupxk3kP5ft/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOGcuRsS3I0lL+VzgafZnWipFPBMRl2ImubdWq96MiGfjSkTMzGXpxXEXGgAYUPrnpJj/69rCCxeP584m/5zL1xHx3Z+8+aN3llqtzcVs/9+O9s8dTh9WeXTeAPMKAgBDlrfflWLd9UH+4f7u8uEyyvI8uBP/LqYiXj7Y382XTs50ZDsj5vO+xIW/JzFdnDMfEc9HxNQQ4u+9GxEf61X/JB8buVTMfNodP4rYz4w0fvqB+Gme11lnna+PDqEsMGneuxMRr/W6/9K4mq973//z+TvU4B7c6Vzs8L3voCv+dBFpqkf87J6/2m+MF3/9lRM72wudvHcjnp/uFT85ip+cEv+FPuP/4ROf+sGrp+S1fxpxLXrH745VbtU3ys3tnRtr9aXV6mp1vVK5vXj75su3XqqU8zHq8uFI9Ul/eeX6s6eVLav/hVPiz/es/+zRuZ/rs/4/+9db3/z0o+Tc8fhf+Gzv1/+5nvE7sjbx833GX7rwi1On787ir5xS/8e9/tf7jP/+n3ZW+jwUABiB5vbO/aVarbo50Eb2KXQY1zmxkRWxv4MPu4uDBf1jnEUtnnBj5qz+Vs98Y/qorzjcK38ju+KIq5MOvRYDbTwcVazxvScBo/Hoph93SQAAAAAAAAAAAAAAgNOM4r8ujbuOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CQAA//+zi8zo") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 65.196921][ T27] audit: type=1400 audit(1702040447.429:225): avc: denied { bind } for pid=4968 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 65.216523][ T27] audit: type=1400 audit(1702040447.429:226): avc: denied { name_bind } for pid=4968 comm="syz-executor.2" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 65.237588][ T27] audit: type=1400 audit(1702040447.429:227): avc: denied { node_bind } for pid=4968 comm="syz-executor.2" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 13:00:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) 13:00:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) 13:00:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x4500, &(0x7f00000000c0)=ANY=[], 0xe, 0x4dc, &(0x7f0000000740)="$eJzs3d9rHFsdAPDvTLI1aVOTqg+1YFtsJS3aTdLYNvhQK4h9Kqj1vcZkE0I22ZDdtE0okuIfIIio4FOffPE/EKQP/gEiCPou/kS0vffhPtx797K7s71pupsN924yJfl8YDrnnJnN93u27OzMnMNOAMfWxYi4ExEDEXE1Ikaz9jRb7jYq2639Xr54MtdYkqjX7/8viSRra/+tJFufar0khiLi+3cjfpS8Gbe6ubU8Wy6X1rP6RG1lbaK6uXVtaWV2sbRYWp2enro5c2vmxsxkX/o5FhG3v/3PX/z0N9+5/fuvPfrbg/9c+XEjrZFs+85+9FOr64Xme9E2GBHrBxEsBwPZutBzzz8ceC4AAPTWOMf/XER8uXn+PxoDzbNTAAAA4Cipf3Mk3k8i6gAAAMCRlTbnwCZpMZsLMBJpWiy25vB+IU6m5Uq19tWFysbqfGuu7FgU0oWlcmkymys8FoWkUZ/K5ti269d31acj4kxE/Hx0uFkvzlXK83nf/AAAAIBj4tSu6/93R1vX/wAAAMARM5Z3AgAAAMCBe+36/1l+eQAAAAAHx/g/AAAAHGnfvXevsdTbz7+ef7i5sVx5eG2+VF0urmzMFecq62vFxUplsfmbfSu9/l65Uln7eqxuPJ6olaq1ierm1oOVysZq7cHSa4/ABgAAAA7RmQvP/5pExPY3hptLw4m8kwIORdJrh5137f5xsLkAh2sg7wSA3AzmnQCQm0LeCQC563UfoOvknT/2PxcAAOBgjH/x1fj/cLutPf7f+95Az9FD4C2W5p0AAHDojP/D8VUwAxCOvc/ubkgitndUP/34f73+SfICAAD6Z6S5JGkxGwsciTQtFiNONx8LUEgWlsqlyez64C+jhc806lPNVyZG/wEAAAAAAAAAAAAAAAAAAAAAAABgn+r1JOoAAADAkRaR/jvJnuQ/Pnp5ZPf9gRPJe6PNdUQ8+vX9Xz6erdXWpxrt/3/VXvtV1n7d88QBAADgbdC+Tm9fxwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAP7188WSuvbyx8cTBxf3vtyJirFP8wRhqroeiEBEn30licMfrkogY6EP87acRcbZT/KSRVoxlWXSKP5xj/DQiTvUhPhxnzxvHnzudPn9pXGyuO3/+GuV/9SF+9+Nf+ur4N9Dl+HN6nzHObe8R/2nEucHOx592/KRL/Ev7jP/DH2xtddtWfxYx3vH7J3kt1kRtZW2iurl1bWlldrG0WFqdnp66OXNr5sbM5MTCUrmU/dsxxs++9LsP9+r/yS7xx1r9v9Ct/5f32f8P/vz4xedbxUKn+Fcudf7+PduK/8b7n2bffV/Jyo3t4+3ydqu80/nf/un8Xv2f79L/Xv//V/bZ/6vf+8nf97krAHAIqptby7PlcmldoXOhXvdGKRzJQgzttU/eRyYAAKDfPj7pzzsTAAAAAAAAAAAAAAAAAAAAOL4O45fGdsfc4+eoAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABy81EAAAD//yvi08c=") truncate(&(0x7f0000000240)='./file1\x00', 0x0) [ 65.307001][ T3103] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.369570][ T4958] EXT4-fs error (device loop3): ext4_do_update_inode:5105: inode #2: comm syz-executor.3: corrupted inode contents [ 65.378285][ T4977] loop5: detected capacity change from 0 to 512 [ 65.397130][ T4980] loop2: detected capacity change from 0 to 512 13:00:47 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 65.409232][ T4958] EXT4-fs error (device loop3): ext4_dirty_inode:5965: inode #2: comm syz-executor.3: mark_inode_dirty error [ 65.429655][ T4980] EXT4-fs (loop2): 1 orphan inode deleted [ 65.435557][ T4980] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.466597][ T4958] EXT4-fs error (device loop3): ext4_do_update_inode:5105: inode #2: comm syz-executor.3: corrupted inode contents [ 65.490659][ T4977] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.505242][ T4986] No such timeout policy "syz0" [ 65.510249][ T4980] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/113/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.537383][ T4958] EXT4-fs error (device loop3): __ext4_ext_dirty:202: inode #2: comm syz-executor.3: mark_inode_dirty error 13:00:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 65.578275][ T4977] ext4 filesystem being mounted at /root/syzkaller-testdir183854782/syzkaller.4AZerW/120/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.601928][ T4980] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 65.621324][ T4958] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 3: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/103/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 65.627321][ T4980] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 65.688531][ T4977] EXT4-fs error (device loop5): ext4_do_update_inode:5105: inode #2: comm syz-executor.5: corrupted inode contents [ 65.713025][ T4990] No such timeout policy "syz0" [ 65.719062][ T4980] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 65.736556][ T4958] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 12: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/103/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 65.763899][ T4980] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 65.773330][ T4977] EXT4-fs error (device loop5): ext4_dirty_inode:5965: inode #2: comm syz-executor.5: mark_inode_dirty error [ 65.789754][ T4980] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 65.798243][ T27] audit: type=1400 audit(1702040448.039:228): avc: denied { write } for pid=4979 comm="syz-executor.2" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 65.810074][ T4977] EXT4-fs error (device loop5): ext4_do_update_inode:5105: inode #2: comm syz-executor.5: corrupted inode contents [ 65.852200][ T4980] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 65.869410][ T4958] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 13: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/103/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 13:00:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$eJzs3c9vHFcdAPDvjH82TesEeoAKSIBCQFF2400bVb20uYBQVQlRcUAcUmNvLJNdr/GuS20s4f4NIIHECf4EDkgckHriwI0jEgeEVA5IASxQjATSopkdO1t7TZbsepd6Px9pMvPmzcz3vWxm39u3m3kBTKyrEbEXEbMR8VZELBT7k2KJ1zpLdtzD/d3lg/3d5STa7Tf/muT52b7oOifzdHHN+Yj42pcjvpWcjNvc3rm/VKtVN4t0uVXfKDe3d26s1ZdWq6vV9Url9uLtmy/feqkytLpeqf/8wZfWXv/6r375yfd/u/fF72XFuljkdddjmDpVnzmKk5mOiNfPItgYTBXr2TGXgyeTRsRHIuIz+f2/EFP5v04A4DxrtxeivdCdBgDOuzQfA0vSUkSkadEJKHXG8J6LC2mt0Wxdv9fYWl/pjJVdipn03lqtevPy3O+/kx88k2TpxTwvz8/TlWPpWxFxOSJ+OPdUni4tN2or4+nyAMDEe7q7/Y+If8ylaanU16k9vtUDAD405sddAABg5LT/ADB5tP8AMHn6aP+LL/v3zrwsAMBo+PwPAJNH+w8Ak0f7DwAT5atvvJEt7YPi+dcrb29v3W+8fWOl2rxfqm8tl5Ybmxul1UZjNX9mT/1x16s1GhuLL8bWO+VWtdkqN7d37tYbW+utu/lzve9WZ0ZSKwDgv7l85b3fJRGx98pT+RJdczloq+F8S8ddAGBspgY5WQcBPtTM9gWTq68mPO8k/ObMywKMR8+Hec/33PygH/8PQfzOCP6vXPt4/+P/5niG88X4P0yuJxv/f3Xo5QBGz/g/TK52Ozk+5//sURYAcC4N8BO+9veH1QkBxupxk3kP5ft/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOGcuRsS3I0lL+VzgafZnWipFPBMRl2ImubdWq96MiGfjSkTMzGXpxXEXGgAYUPrnpJj/69rCCxeP584m/5zL1xHx3Z+8+aN3llqtzcVs/9+O9s8dTh9WeXTeAPMKAgBDlrfflWLd9UH+4f7u8uEyyvI8uBP/LqYiXj7Y382XTs50ZDsj5vO+xIW/JzFdnDMfEc9HxNQQ4u+9GxEf61X/JB8buVTMfNodP4rYz4w0fvqB+Gme11lnna+PDqEsMGneuxMRr/W6/9K4mq973//z+TvU4B7c6Vzs8L3voCv+dBFpqkf87J6/2m+MF3/9lRM72wudvHcjnp/uFT85ip+cEv+FPuP/4ROf+sGrp+S1fxpxLXrH745VbtU3ys3tnRtr9aXV6mp1vVK5vXj75su3XqqU8zHq8uFI9Ul/eeX6s6eVLav/hVPiz/es/+zRuZ/rs/4/+9db3/z0o+Tc8fhf+Gzv1/+5nvE7sjbx833GX7rwi1On787ir5xS/8e9/tf7jP/+n3ZW+jwUABiB5vbO/aVarbo50Eb2KXQY1zmxkRWxv4MPu4uDBf1jnEUtnnBj5qz+Vs98Y/qorzjcK38ju+KIq5MOvRYDbTwcVazxvScBo/Hoph93SQAAAAAAAAAAAAAAgNOM4r8ujbuOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CQAA//+zi8zo") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 65.895566][ T4980] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 65.906013][ T4977] EXT4-fs error (device loop5): __ext4_ext_dirty:202: inode #2: comm syz-executor.5: mark_inode_dirty error [ 65.934667][ T3117] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:00:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x4500, &(0x7f00000000c0)=ANY=[], 0xe, 0x4dc, &(0x7f0000000740)="$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") truncate(&(0x7f0000000240)='./file1\x00', 0x0) [ 65.944915][ T27] audit: type=1400 audit(1702040448.189:229): avc: denied { open } for pid=4979 comm="syz-executor.2" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 13:00:48 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 65.999079][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 66.057339][ T4995] loop3: detected capacity change from 0 to 512 [ 66.069664][ T4977] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 3: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/120/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 66.091032][ T4997] loop2: detected capacity change from 0 to 512 [ 66.110598][ T4999] No such timeout policy "syz0" [ 66.122060][ T4995] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.136273][ T4995] ext4 filesystem being mounted at /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/104/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 66.170670][ T4977] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 12: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/120/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 66.243097][ T4997] EXT4-fs (loop2): 1 orphan inode deleted [ 66.248936][ T4997] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.263150][ T4995] EXT4-fs error (device loop3): ext4_do_update_inode:5105: inode #2: comm syz-executor.3: corrupted inode contents [ 66.286319][ T4997] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/114/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 66.325275][ T4995] EXT4-fs error (device loop3): ext4_dirty_inode:5965: inode #2: comm syz-executor.3: mark_inode_dirty error [ 66.353892][ T4977] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 13: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/120/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 66.399498][ T4997] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 66.404145][ T4995] EXT4-fs error (device loop3): ext4_do_update_inode:5105: inode #2: comm syz-executor.3: corrupted inode contents [ 66.438092][ T4997] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 66.451949][ T4997] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 66.466286][ T4977] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 14: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/120/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 66.477119][ T4995] EXT4-fs error (device loop3): __ext4_ext_dirty:202: inode #2: comm syz-executor.3: mark_inode_dirty error [ 66.519162][ T4997] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 66.556230][ T4997] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length 13:00:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)=ANY=[], 0x1, 0x53b, &(0x7f0000000a80)="$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") bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r0}], 0x2, &(0x7f00000001c0), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000600000000e3fbff04001b0752f1ff0000000000"], &(0x7f0000000740)='GPL\x00', 0x7fffffff, 0x71, &(0x7f0000000780)=""/113, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x10, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r0, 0x1]}, 0x80) close_range(r1, r1, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x53d83000) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x30a8015, 0x0, 0x0, 0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000480)='.\x00', 0x70000, 0x0) sendfile(r3, r3, 0x0, 0x81) getdents64(r3, &(0x7f00000002c0)=""/93, 0x5d) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000fc0)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x44018) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r6 = open(&(0x7f0000000180)='./file2\x00', 0x1cd842, 0x0) getdents64(r2, &(0x7f0000000440)=""/30, 0x1e) getsockname$packet(r6, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) recvfrom$packet(r3, &(0x7f0000001000)=""/223, 0xdf, 0x2000, &(0x7f0000001180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=@delqdisc={0x2c, 0x25, 0x0, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x2, 0x6}, {0xa, 0xa}, {0xb, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x7}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) 13:00:48 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 13:00:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 66.590695][ T4997] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 66.608531][ T3103] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:00:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x4500, &(0x7f00000000c0)=ANY=[], 0xe, 0x4dc, &(0x7f0000000740)="$eJzs3d9rHFsdAPDvTLI1aVOTqg+1YFtsJS3aTdLYNvhQK4h9Kqj1vcZkE0I22ZDdtE0okuIfIIio4FOffPE/EKQP/gEiCPou/kS0vffhPtx797K7s71pupsN924yJfl8YDrnnJnN93u27OzMnMNOAMfWxYi4ExEDEXE1Ikaz9jRb7jYq2639Xr54MtdYkqjX7/8viSRra/+tJFufar0khiLi+3cjfpS8Gbe6ubU8Wy6X1rP6RG1lbaK6uXVtaWV2sbRYWp2enro5c2vmxsxkX/o5FhG3v/3PX/z0N9+5/fuvPfrbg/9c+XEjrZFs+85+9FOr64Xme9E2GBHrBxEsBwPZutBzzz8ceC4AAPTWOMf/XER8uXn+PxoDzbNTAAAA4Cipf3Mk3k8i6gAAAMCRlTbnwCZpMZsLMBJpWiy25vB+IU6m5Uq19tWFysbqfGuu7FgU0oWlcmkymys8FoWkUZ/K5ti269d31acj4kxE/Hx0uFkvzlXK83nf/AAAAIBj4tSu6/93R1vX/wAAAMARM5Z3AgAAAMCBe+36/1l+eQAAAAAHx/g/AAAAHGnfvXevsdTbz7+ef7i5sVx5eG2+VF0urmzMFecq62vFxUplsfmbfSu9/l65Uln7eqxuPJ6olaq1ierm1oOVysZq7cHSa4/ABgAAAA7RmQvP/5pExPY3hptLw4m8kwIORdJrh5137f5xsLkAh2sg7wSA3AzmnQCQm0LeCQC563UfoOvknT/2PxcAAOBgjH/x1fj/cLutPf7f+95Az9FD4C2W5p0AAHDojP/D8VUwAxCOvc/ubkgitndUP/34f73+SfICAAD6Z6S5JGkxGwsciTQtFiNONx8LUEgWlsqlyez64C+jhc806lPNVyZG/wEAAAAAAAAAAAAAAAAAAAAAAABgn+r1JOoAAADAkRaR/jvJnuQ/Pnp5ZPf9gRPJe6PNdUQ8+vX9Xz6erdXWpxrt/3/VXvtV1n7d88QBAADgbdC+Tm9fxwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAP7188WSuvbyx8cTBxf3vtyJirFP8wRhqroeiEBEn30licMfrkogY6EP87acRcbZT/KSRVoxlWXSKP5xj/DQiTvUhPhxnzxvHnzudPn9pXGyuO3/+GuV/9SF+9+Nf+ur4N9Dl+HN6nzHObe8R/2nEucHOx592/KRL/Ev7jP/DH2xtddtWfxYx3vH7J3kt1kRtZW2iurl1bWlldrG0WFqdnp66OXNr5sbM5MTCUrmU/dsxxs++9LsP9+r/yS7xx1r9v9Ct/5f32f8P/vz4xedbxUKn+Fcudf7+PduK/8b7n2bffV/Jyo3t4+3ydqu80/nf/un8Xv2f79L/Xv//V/bZ/6vf+8nf97krAHAIqptby7PlcmldoXOhXvdGKRzJQgzttU/eRyYAAKDfPj7pzzsTAAAAAAAAAAAAAAAAAAAAOL4O45fGdsfc4+eoAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABy81EAAAD//yvi08c=") truncate(&(0x7f0000000240)='./file1\x00', 0x0) [ 66.657826][ T4997] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 66.660831][ T4995] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 3: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 66.677839][ T5007] loop5: detected capacity change from 0 to 512 [ 66.730652][ T4995] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 12: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 66.778378][ T4995] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 13: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 66.823832][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 66.844195][ T5010] No such timeout policy "syz0" [ 66.849942][ T5007] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.896460][ T5007] ext4 filesystem being mounted at /root/syzkaller-testdir183854782/syzkaller.4AZerW/121/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 66.914655][ T5011] No such timeout policy "syz0" [ 66.952486][ T5016] loop2: detected capacity change from 0 to 512 [ 66.957083][ T4995] EXT4-fs error (device loop3): ext4_readdir:260: inode #2: block 14: comm syz-executor.3: path /root/syzkaller-testdir3136372350/syzkaller.s7XeyX/104/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 66.988601][ T5007] EXT4-fs error (device loop5): ext4_do_update_inode:5105: inode #2: comm syz-executor.5: corrupted inode contents [ 67.018542][ T5016] EXT4-fs (loop2): 1 orphan inode deleted [ 67.024335][ T5016] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 67.046230][ T5007] EXT4-fs error (device loop5): ext4_dirty_inode:5965: inode #2: comm syz-executor.5: mark_inode_dirty error 13:00:49 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.076274][ T5016] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/115/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 67.094766][ T5007] EXT4-fs error (device loop5): ext4_do_update_inode:5105: inode #2: comm syz-executor.5: corrupted inode contents [ 67.115576][ T3117] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.143960][ T5007] EXT4-fs error (device loop5): __ext4_ext_dirty:202: inode #2: comm syz-executor.5: mark_inode_dirty error [ 67.174926][ T5016] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 67.204464][ T5007] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 3: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/121/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=514, rec_len=0, size=2048 fake=0 [ 67.234642][ T5016] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 13:00:49 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000a00)={0x8, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000900)={@dev}, &(0x7f00000009c0)=0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) set_mempolicy(0x0, &(0x7f0000000080), 0x9) set_mempolicy(0x3, &(0x7f00000003c0)=0x8000000000000001, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8910, &(0x7f0000000bc0)={'ip6gre0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x0, 0x6, 0x4cd}, 0x10}, 0x90) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000480)=""/117, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x90) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x88, 0x7ff, 0x0, 0x0, 0xfff}) r2 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000880)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000008c0)=0x2c) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 67.256609][ T5007] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 12: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/121/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5066064, rec_len=1, size=2048 fake=0 [ 67.287058][ T5016] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length 13:00:49 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "894600b2ab34bcdcd1d9a5e60f5e84ad3cbd5c463eb9db3d8aa96fe65eb912f99e0012c5d37dd7bb7ef49dc837038ff4b910115bef8304c4a67aad71b60e7b99be6071fe6e6b48df2df37f9581a392bb6b9ef1ef4c11f218cbda3bbe7981a560f9304554e455c3219102f353fce6dd2937f77f6bef8b0033032db51c4be49a74a90a81e2685f36beebf6e647ac80040fbfe22c8b0a11ee6df6213142e7c966d89fe1e4e09a771cac386d707909ddd576d0df2df39831add416ade3f4b60b0c41b2deaaf783b7d59b768ade2af71920e647c46c73ff83a8021eb15966b9e59a49c674bdcf1ea30e386e3cf509874f133933cfab0d0300dfae679b68a0c2f6598f", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.310830][ T27] audit: type=1400 audit(1702040449.549:230): avc: denied { create } for pid=5022 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 13:00:49 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.364601][ T5016] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 13:00:49 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.393380][ T27] audit: type=1400 audit(1702040449.589:231): avc: denied { read write } for pid=5022 comm="syz-executor.3" name="rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.417172][ T27] audit: type=1400 audit(1702040449.589:232): avc: denied { open } for pid=5022 comm="syz-executor.3" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.460594][ T5016] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 67.500900][ T5007] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 13: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/121/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3653246737, rec_len=1, size=2048 fake=0 [ 67.563381][ T5016] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 67.574207][ T5007] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 14: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/121/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=3, rec_len=0, size=2048 fake=0 [ 67.580917][ T5039] No such timeout policy "syz0" 13:00:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x4500, &(0x7f00000000c0)=ANY=[], 0xe, 0x4dc, &(0x7f0000000740)="$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") truncate(&(0x7f0000000240)='./file1\x00', 0x0) [ 67.629817][ T5016] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 67.668907][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:00:50 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "894600b2ab34bcdcd1d9a5e60f5e84ad3cbd5c463eb9db3d8aa96fe65eb912f99e0012c5d37dd7bb7ef49dc837038ff4b910115bef8304c4a67aad71b60e7b99be6071fe6e6b48df2df37f9581a392bb6b9ef1ef4c11f218cbda3bbe7981a560f9304554e455c3219102f353fce6dd2937f77f6bef8b0033032db51c4be49a74a90a81e2685f36beebf6e647ac80040fbfe22c8b0a11ee6df6213142e7c966d89fe1e4e09a771cac386d707909ddd576d0df2df39831add416ade3f4b60b0c41b2deaaf783b7d59b768ade2af71920e647c46c73ff83a8021eb15966b9e59a49c674bdcf1ea30e386e3cf509874f133933cfab0d0300dfae679b68a0c2f6598f", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) 13:00:50 executing program 4: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "e9828d05eaf26ece0c518e6f18b2f23bb9b8b5840c03c316788455ca4fa6c17c0cf1c017e54433ad72136480e9f755fad16a32dd9901403e2fc730c2869883ac909063b9597e24e06aaa099c928b7851a8f25991f1c116ec7b2fd6fde4ea9e8a4e38442a6a852a89396bef3a3bf97df8765ce3fdebd4e46be7ed105e1aa69d2c431d7fbe43290ebeb48abf6ae76a1ca085332ebda586e1dc11793cfedeada381506825e4f4b0e4dd89c7878befd308c9820fc5da71ec60a2641baa5c9c85dc1d62c0d01427250f4eeca83a19406ebed7e5b1e6d0dea2eeddb705bcbbf249d0364f22971833402847c72f0609db53a6eca729226415d3051119bde11d66b39862"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.738702][ T5007] EXT4-fs error (device loop5): ext4_readdir:260: inode #2: block 15: comm syz-executor.5: path /root/syzkaller-testdir183854782/syzkaller.4AZerW/121/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=5, rec_len=0, size=2048 fake=0 [ 67.783316][ T5042] loop2: detected capacity change from 0 to 512 [ 67.813440][ T5042] EXT4-fs (loop2): 1 orphan inode deleted [ 67.819564][ T5042] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 13:00:50 executing program 5: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.887685][ T3103] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:00:50 executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 67.976348][ T5042] ext4 filesystem being mounted at /root/syzkaller-testdir3552779997/syzkaller.tGMep6/116/file1 supports timestamps until 2038-01-19 (0x7fffffff) 13:00:50 executing program 5: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 68.048432][ T5042] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length 13:00:50 executing program 4: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 68.125622][ T5042] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 68.177056][ T5042] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length 13:00:50 executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "e9828d05eaf26ece0c518e6f18b2f23bb9b8b5840c03c316788455ca4fa6c17c0cf1c017e54433ad72136480e9f755fad16a32dd9901403e2fc730c2869883ac909063b9597e24e06aaa099c928b7851a8f25991f1c116ec7b2fd6fde4ea9e8a4e38442a6a852a89396bef3a3bf97df8765ce3fdebd4e46be7ed105e1aa69d2c431d7fbe43290ebeb48abf6ae76a1ca085332ebda586e1dc11793cfedeada381506825e4f4b0e4dd89c7878befd308c9820fc5da71ec60a2641baa5c9c85dc1d62c0d01427250f4eeca83a19406ebed7e5b1e6d0dea2eeddb705bcbbf249d0364f22971833402847c72f0609db53a6eca729226415d3051119bde11d66b39862"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) [ 68.266455][ T5042] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 68.296912][ T5042] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 68.340756][ T5042] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #15: comm syz-executor.2: corrupted xattr block 19: bad e_name length [ 68.407479][ T5042] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop2 ino=15 [ 68.453156][ T3100] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:00:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x3c}}, 0x0) 13:00:50 executing program 5: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "894600b2ab34bcdcd1d9a5e60f5e84ad3cbd5c463eb9db3d8aa96fe65eb912f99e0012c5d37dd7bb7ef49dc837038ff4b910115bef8304c4a67aad71b60e7b99be6071fe6e6b48df2df37f9581a392bb6b9ef1ef4c11f218cbda3bbe7981a560f9304554e455c3219102f353fce6dd2937f77f6bef8b0033032db51c4be49a74a90a81e2685f36beebf6e647ac80040fbfe22c8b0a11ee6df6213142e7c966d89fe1e4e09a771cac386d707909ddd576d0df2df39831add416ade3f4b60b0c41b2deaaf783b7d59b768ade2af71920e647c46c73ff83a8021eb15966b9e59a49c674bdcf1ea30e386e3cf509874f133933cfab0d0300dfae679b68a0c2f6598f", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) 13:00:50 executing program 4: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) 13:00:50 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) 13:00:50 executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) 13:00:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x3c}}, 0x0) 13:00:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x3c}}, 0x0) [ 68.633430][ T27] audit: type=1326 audit(1702040450.879:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5072 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5364f0aba9 code=0x7ffc0000 13:00:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x3c}}, 0x0) [ 68.734467][ T27] audit: type=1326 audit(1702040450.879:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5072 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5364f0aba9 code=0x7ffc0000 [ 68.758374][ T27] audit: type=1326 audit(1702040450.879:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5072 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5364f0aba9 code=0x7ffc0000 [ 68.782100][ T27] audit: type=1326 audit(1702040450.879:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5072 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5364f0aba9 code=0x7ffc0000 [ 68.806383][ T27] audit: type=1326 audit(1702040450.879:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5072 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f5364f0aba9 code=0x7ffc0000 13:00:51 executing program 3: prctl$PR_SET_PDEATHSIG(0x1, 0x3a) r0 = syz_clone(0x400, &(0x7f0000000000)="270640d4ffeb03539a9489a641deaebf02a6960e3ce7da74c3a4eec51b1c175095d99df20e5cd771efe8bcf620ff3fa8408c3a", 0x33, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="d0dd160fdae2734262e77bdf9b1c96e343d882ebb7262fe663ce49f6823dca516c9fd26227d527ea7398b9fdfd8e5d014e159fd22b9d5fd67f88fee464c303cabf9288668a14814e1857ddb5a95f18396e24baaa052284419c9ef5a6babded3df6920e8873968126f93e82b7994e7752d3f97b034c87cbdd596713172d59fb3e3fb9fa054e8db1c74c4e4dda7988d93c72d96253252af79f1adb64eebe5587f85329eb24198cad42e8b73feffffe750b0e9169f53d8ffe11c4daeb6b12bc0684d705a0fb4b0e8e0b39f0560cf93be55c33") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x12) prctl$PR_SET_PDEATHSIG(0x1, 0x38) rt_sigreturn() write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @empty, 0x8}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7f}, 0xffffffffffffffff, 0x5}}, 0x48) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x0, "b65f05d017a19f50bf3f1d90df11575f738603f1230248c40394d8d3b682b953daf671a887e9abb6cedf4134434abc1e8f2199a8f9e1ac6825b68785d7b7b3", 0x26}, 0x60) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0xffff59cf, 0xb0, "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", 0x37, 0x8, 0x3f, 0x9, 0x2, 0x1, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000700)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x4, "8ea432", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000b40)={0x13, 0x10, 0xfa00, {&(0x7f0000000940), r3}}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x810) r6 = syz_clone(0xc21080, &(0x7f0000000c80)="08d3582286199cb0eb209e6f9d90c7a44ed485dfa43a3b44946b9cf99b8f682c25b370ce89baa7812f178c805c51a7d3e25717e231c2dfd6c7470c279833f06ae32da1fd10e08a07d535a8ea4f59a724977b34307753de52116686aeac3dccdb8bf31a48b1b11c0220223ebb41699ec1b2763ab1eb6277e739bf5001cd1174d9ec136547", 0x84, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="9d56fa3898b8f08bd57433656a72dc4f25005410cd615e23a2ab6ca4ea92013052b22abb7da798c4f6d24c20efd7bff23710c6a84957a0a7a3c6f013caa87eb77bf6bcc7a6393a3297894dd80950afaf0d104b84e84b4959cd5d37409b5b70b225cb7f49ab96c278b3a41f1af54e9e8eeb287c14f39f0afbecf5f9c695986fe0c16ae229925bc8092da3b5ca5af1a632aa2d13a5791d947dfb71aeeb671157f5e22d9e255d5d10870b980322975a6c1409dfc55a8112abe68a12c21d93105f2a383cb9c533e00c041bdd7a4248489a3d23a8879479d1f80d0d32e402629f4d17d912") ptrace(0xffffffffffffffff, r6) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000f00)='lazytime\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000001000)={0xa, 0x4}, 0xc) 13:00:51 executing program 5: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000009c0)=@framed={{}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0xa, 0x8}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, @printk={@p, {0x3, 0x3, 0x3, 0xa, 0xa}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 13:00:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCINQ(r0, 0x5421, &(0x7f0000000180)) 13:00:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000009c0)=@framed={{}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0xa, 0x8}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, @printk={@p, {0x3, 0x3, 0x3, 0xa, 0xa}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 13:00:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000009c0)=@framed={{}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0xa, 0x8}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, @printk={@p, {0x3, 0x3, 0x3, 0xa, 0xa}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 13:00:51 executing program 5: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000009c0)=@framed={{}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0xa, 0x8}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, @printk={@p, {0x3, 0x3, 0x3, 0xa, 0xa}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 13:00:51 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCINQ(r0, 0x5421, &(0x7f0000000180)) 13:00:51 executing program 5: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) chown(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 13:00:51 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCINQ(r0, 0x5421, &(0x7f0000000180)) 13:00:51 executing program 5: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100060, &(0x7f0000000140)=ANY=[@ANYBLOB="73697a653da7"]) 13:00:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCINQ(r0, 0x5421, &(0x7f0000000180)) 13:00:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="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", 0x583) [ 69.842257][ T5143] hugetlbfs: Bad value '§' for mount option 'size' [ 69.842257][ T5143] 13:00:52 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="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", 0x583) 13:00:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="c9a894dca3299169c8919c91c425b289cfc9aeb29c9ac70cbf5cec375fb675f8592471ca641950e967d9028d42e1321f39bd6254f16394abafba77a224980a121c2d660422d8bda774796ec9baceadb114362416867211c70a8932ff57582708f35db385752ae3797bab2c795aafff951d9e9c16f595ba6c2c9512cecc6f131237b360bfebdf77ec4859544529fa6b66fbb5d656246cc2469ff0e657ed8c35025180e982fc1f12d27956d442307316293491b3e224e68ece1e6785f1921d834b316b0eae45df5c4bd0aa7774a2db8ea02ea4131d69d8c057c6934f8b3f2cd3477b54557ce2ce21d7d9a0fc6c25870c7d25e26dd2386ca00073d54d410315c12ca49a8f187d772d3d7a7f26cb3b247bb013bc5fbfe92e71e907c454686971a08b836634b4218d1d2e079781c7dac950b8fa6f186f1092bd284bdee55b0513ac9d08ce2221698c53562584b65f9771ded74c6f60fa40613d0ccb0e89844c21d6890477b4ba6b1d3e030073547821878919c1bd48f97c841c348a66599271f8185b0d920cf8b92a908e6219a555f8c24f50ccb1b4ab7aa8e12a74afee48c5df41c5958e95e9a22e2fd340367fef0ad1602705e568950db97be2c42c61492e78e82b903df4da8af27eaa7ff12423eb56373d767ef0b9853f07b2b66d6b5200f2840777ea09aa19e7a49d1545bc5acaa568974ab3da612824001fbc5f1eea9ee7cbc0b6b1f35b42d3ae1b56e434b9d0d36921014df5bf42a7ba404e33f83357b6a8a6b475e86050f7b78f3bb5850110ab18403b479b2eb9447c3fa6e0110866fea6fd5d338057750d14b46cc05cdb721cbd8121e8e2ffdad444c38c918fe0375e20db7fe14c032453b32950553229fe14a5abb42e977fe33d3288ac13cd6e830e8cf39b73a318511870e7fd5b4dd54049dabbc9ed03d46b7e33b6d784375055a4e379a816729055fbbaa51b5bb3f5395c7336d64731d95384b96addbff032f78df0a6bcf82d0e06c92d54e96f445eaa3f92bff192ff696ff1d63ddb98fc2c4f0c0ab2954c6b587fbd4e412d17dc2d438efb9daae600a8ba183435d6803af77a7691a14e5db41100526a931741d1a1cc83dcd5c7d7541e9b8c0ffc3a9f9ff28aeac5a79b0ee557d74bc7925239114e7e238a40c42de3f3939491c37efcda1c55e0a34d3690737ccce0ca06b9c4160d8889b90260f13448611cb10160770711be43b35dca04b20f3497dea0353196bbd2caf2d109bf4a8a2e0c87674bde73613095966d857d7f4f7a5356a2983ed1f5ba62f3e8f9af2041211f3b925089afa4fbc5ff04003bccda21dbde2df638c1431b642d67c5c9ecfc95cdaf751039996bafacb0eb585dd14a9b10cdb3e762db25bd5ee68217b410891b98d5250d14ffd2c0c4e4e8b8b4e14f3620a582b7837926a0fffa5277748e30ee0e5237e35b46af6e7a0eeba77c4727ae9f80ca4290fc1cbca6d8dad0c746dfa13d46441d09c07b21bda8ffc01e0e9195197cc88179a652a9f75617a78d92edcec25472ac39ddaf64c3dfe40b6a967a3e466ef2eca3fdfad9b5ff8deb1e5b34327dd325498c7232636cbe73d2335b5549af1171440731485ff13be6b481ad59c3a9803ff12de825f68750f3e1b5d78bc675a8b621905ab30711a69ed483237cadadd3ad18a65385627bbecf5a156ca16309023b6d24cd72318c54df71b15ba85a0227e152c903c7e284047b11c474924f48f700ca4362977f5557641aefddb488ce9979c6b4d15f33495282f6bbcd61a28c80d3815bea401b9b7faed5bc894dcd69d67d06eed4cfcb8378a268ea05e32ca9b46d939751800ce1b0e533d9559aab670a5e8933c3f4aaac4c94d2fed54ca9ce9230b361686bbab37d9992c0877d826b5758617da5f65eb3a9ec6413e612aa1d0381898966213e60618acb0b135092727c4573279b77706a564dea9f2f5c869d10ea671a2e3fb54041864a2652f6e259ab4c10e3fabb332599d6f49ad8", 0x583) 13:00:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100060, &(0x7f0000000140)=ANY=[@ANYBLOB="73697a653da7"]) 13:00:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="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", 0x583) 13:00:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="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", 0x583) [ 70.046630][ T5159] hugetlbfs: Bad value '§' for mount option 'size' [ 70.046630][ T5159] 13:00:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="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", 0x583) 13:00:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 13:00:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100060, &(0x7f0000000140)=ANY=[@ANYBLOB="73697a653da7"]) 13:00:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:00:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) [ 70.306437][ T5177] hugetlbfs: Bad value '§' for mount option 'size' [ 70.306437][ T5177] 13:00:52 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00003c1000/0x1000)=nil, 0x1000) mlock2(&(0x7f00006bf000/0x1000)=nil, 0x1000, 0x1) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14d27e, 0x0) mprotect(&(0x7f0000735000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 13:00:52 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=',U', 0x2}], 0x1}, 0x48900) write(r0, &(0x7f0000000d00)="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", 0x583) 13:00:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100060, &(0x7f0000000140)=ANY=[@ANYBLOB="73697a653da7"]) 13:00:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 13:00:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 13:00:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x75}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 13:00:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xe2a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x3}, @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x2, 0x0, 0x24, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "9f6428b3a5994c96595c7f932f2527224147b47e0d4dee17"}}}}, 0xfe01) [ 70.560146][ T5186] hugetlbfs: Bad value '§' for mount option 'size' [ 70.560146][ T5186] 13:00:52 executing program 0: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 13:00:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080005007c09e8fe0aa10a000b000c00142603600e1208000f0000000401a800080008000c400f000000035c0561c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 70.630566][ T5193] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 13:00:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x75}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 13:00:52 executing program 0: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 13:00:53 executing program 0: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) [ 70.786264][ T5202] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 13:00:53 executing program 3: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 13:00:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xe2a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x3}, @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x2, 0x0, 0x24, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "9f6428b3a5994c96595c7f932f2527224147b47e0d4dee17"}}}}, 0xfe01) 13:00:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080005007c09e8fe0aa10a000b000c00142603600e1208000f0000000401a800080008000c400f000000035c0561c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 13:00:53 executing program 0: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 13:00:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x75}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 13:00:53 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:53 executing program 0: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) [ 71.683878][ T5212] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 13:00:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080005007c09e8fe0aa10a000b000c00142603600e1208000f0000000401a800080008000c400f000000035c0561c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 13:00:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xe2a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x3}, @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x2, 0x0, 0x24, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "9f6428b3a5994c96595c7f932f2527224147b47e0d4dee17"}}}}, 0xfe01) 13:00:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x75}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 13:00:54 executing program 3: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 13:00:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xe2a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x3}, @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x2, 0x0, 0x24, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "9f6428b3a5994c96595c7f932f2527224147b47e0d4dee17"}}}}, 0xfe01) [ 72.243548][ T5219] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 13:00:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080005007c09e8fe0aa10a000b000c00142603600e1208000f0000000401a800080008000c400f000000035c0561c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 13:00:54 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:54 executing program 5: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) [ 72.396145][ T5233] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 13:00:54 executing program 3: timer_create(0xb, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 13:00:54 executing program 2: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:55 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:55 executing program 3: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:55 executing program 0: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:55 executing program 2: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:55 executing program 5: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:56 executing program 0: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:56 executing program 3: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:56 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:56 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:56 executing program 5: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:56 executing program 2: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 3: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000088005300000000faff0000940000000fad413e550000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='THAWED\x00', 0x7) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r8}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000540)='FROZEN\x00') write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1f, &(0x7f0000000900)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0xa, 0x40, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @generic={0x6, 0x9, 0x5, 0x0, 0x80000000}, @map_val={0x18, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0xa0, &(0x7f0000000600)=""/160, 0x40f00, 0x8, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x5, 0xd}, {0x4, 0x1, 0xe}, {0x1, 0x2, 0xd}, {0x3, 0x4, 0x5}, {0x4, 0x3, 0x0, 0x8}, {0x1, 0x5, 0xf, 0x5}], 0x10, 0x7}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='sched_process_wait\x00') r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r10}, 0x10) r12 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) write$cgroup_int(r12, &(0x7f00000001c0), 0xfffffdef) 13:00:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001880)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:00:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000c40)={&(0x7f0000000840)={0xa, 0x0, @local}, 0x10, 0x0}, 0x0) 13:00:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r6) 13:00:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r6) 13:00:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x20) 13:00:57 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000c40)={&(0x7f0000000840)={0xa, 0x0, @local}, 0x10, 0x0}, 0x0) 13:00:57 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) 13:00:57 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x2}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x34}}, 0x0) 13:00:57 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000c40)={&(0x7f0000000840)={0xa, 0x0, @local}, 0x10, 0x0}, 0x0) 13:00:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x5}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x60}}, 0x0) 13:00:57 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000c40)={&(0x7f0000000840)={0xa, 0x0, @local}, 0x10, 0x0}, 0x0) 13:00:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r6) 13:00:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x5}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x60}}, 0x0) 13:00:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0xffffffff, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5ed0000002f0000ac141417ef06e63a808a5e5cbd0f72e410820c520f0604e4fdfe4b88af305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521a3c72f99a80b5fd8cdc1c7e6924c5ffa0"], 0x3000}], 0x1}, 0x0) sendfile(r3, r2, 0x0, 0x80000001) 13:00:57 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x2}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x34}}, 0x0) 13:00:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x5}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x60}}, 0x0) 13:00:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r6) 13:00:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x5}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x60}}, 0x0) [ 75.698144][ T27] kauditd_printk_skb: 112 callbacks suppressed [ 75.698156][ T27] audit: type=1400 audit(1702040457.949:350): avc: denied { read } for pid=5330 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 13:00:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x2}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x34}}, 0x0) 13:00:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:58 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x2}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x34}}, 0x0) 13:00:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000e40000d00000000080000000850000006d00000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 13:00:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0xffffffff, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5ed0000002f0000ac141417ef06e63a808a5e5cbd0f72e410820c520f0604e4fdfe4b88af305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521a3c72f99a80b5fd8cdc1c7e6924c5ffa0"], 0x3000}], 0x1}, 0x0) sendfile(r3, r2, 0x0, 0x80000001) 13:00:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x7010044, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x9, 0x21e, &(0x7f0000000400)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="78ab30"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 13:00:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) 13:00:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) [ 75.965390][ T27] audit: type=1400 audit(1702040458.209:351): avc: denied { read } for pid=5378 comm="syz-executor.2" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 75.966620][ T5381] loop0: detected capacity change from 0 to 256 13:00:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x7010044, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x9, 0x21e, &(0x7f0000000400)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="78ab30"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 13:00:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) 13:00:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) [ 75.989067][ T27] audit: type=1400 audit(1702040458.209:352): avc: denied { open } for pid=5378 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 76.019592][ T27] audit: type=1400 audit(1702040458.209:353): avc: denied { ioctl } for pid=5378 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=117 ioctlcmd=0x920a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 13:00:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) [ 76.069039][ T5390] loop0: detected capacity change from 0 to 256 13:00:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0xffffffff, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5ed0000002f0000ac141417ef06e63a808a5e5cbd0f72e410820c520f0604e4fdfe4b88af305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521a3c72f99a80b5fd8cdc1c7e6924c5ffa0"], 0x3000}], 0x1}, 0x0) sendfile(r3, r2, 0x0, 0x80000001) 13:00:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) 13:00:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='b', 0x1}], 0x1}, 0x0) 13:00:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x7010044, &(0x7f0000000200)=ANY=[@ANYBLOB="7574663800000080000072747769d06e749d6ced909440691afcc22bcbb32c696f6b6861727365743d63703836342c696f63b06f3835392d352c83686f72746e616d653d6c6f7765722c73686f727400000400000000000000000000000000000800000000000000f5e66e5b8c54baf26851fdcb87c9fcc92f085e5073f37e84433cd358b4e247563a87c4a7d1fa14ccf3111fa968fc9df73d755d06e22515254b43b87c3fce41376b50a8eded01df96f64b55ffc79f0f83d3a387415e65abb3db1132eb32fd7ccf8529caa65dec5f69933db6fd6f5d3418a2c1af67f5b3f5c8977d42fe5ce4e5e73f1e1f47a3a93eb4f7d46c4ddef22a2bf0661b85a63d8303508a8d864d315f7d28dfccb500aaf9cffbbc164f39e02c166527af916954f45bba602758ddce5bec7e02edfb89c8e17681e71edf1c1b97ed0d1ec01a5f3a38dd16d776bdf102d4b9c9a548e4edcd27ea"], 0x9, 0x21e, &(0x7f0000000400)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="78ab30"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 13:00:58 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) [ 76.456887][ T5415] loop0: detected capacity change from 0 to 256 13:00:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:00:59 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x4018920a, 0x0) 13:00:59 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, 'q5c', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2c11, 0x0, 0x2, [{0x5, 0x3, "179a39380ba4beab96b64c00b2b4d07287a67909ac68"}]}}}}}}, 0x0) 13:00:59 executing program 1: r0 = syz_io_uring_setup(0x321f, &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 13:00:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x7010044, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x9, 0x21e, &(0x7f0000000400)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="78ab30"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 13:00:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0xffffffff, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5ed0000002f0000ac141417ef06e63a808a5e5cbd0f72e410820c520f0604e4fdfe4b88af305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521a3c72f99a80b5fd8cdc1c7e6924c5ffa0"], 0x3000}], 0x1}, 0x0) sendfile(r3, r2, 0x0, 0x80000001) 13:00:59 executing program 1: r0 = syz_io_uring_setup(0x321f, &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 13:00:59 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, 'q5c', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2c11, 0x0, 0x2, [{0x5, 0x3, "179a39380ba4beab96b64c00b2b4d07287a67909ac68"}]}}}}}}, 0x0) 13:00:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a67880141cca555077e3a15910e193dd2ff1fa7c3205bfedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b2e1a38d522be18bd11548b043ccc42646d25dfd73bb6d7535f7866907dc6751dfced1fd8accae66e8a0e4f653419e173a649c1cfd6587d47578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d566a0f06c54c3a4ccbdf31c4d4acef2ce3599f455c7a3a48a01010000009f2f0517e4ca0e1803a2971a50f713d4e21b3336f1ae0796f23526ec0fd900734c4c815bf697e6bd009d2e797ff6ff72ba8972b122b09789d99b3d0524f39dc09244ba5dbe9180950f76f7049db5cb19d7962fed44e00f39ed8c13a11fa798de504e0865cd81f2b77fdd76c677f812d249c8130b018d430454ffdca8b7fbc254f4348c8d7305000000000000593d60abc9b3e67d127e56f3d3759dcfeb820634fd4d419efaefb24305b2bea20007840484511b6efaad20633500000000e01446a6285f4665a7fe37da2349f8bf4064726dc32add75e0f435f28fbeda75cf971d54a9698cf3270f420edc85c176070bfff7909413f3fbd3ced3284db730b368ddca654dd7836f171b766ffd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914909187b6b0776952be5cb0417d33d3ab25494c18494d9d10d76e603129e9a726579ac7d672cacd581b7e2fc7a5758fcfb822de1dacc357341e000cc34c49914f1aa198a77b3610b5403930fd42051d4b7443e5b49c000000000000007d6173050027791c9c1e04ad3711a66d91254a6f911b1449c62a6e1e3f9ce19a9d1715c009a58e6eadac8f61b45853673df72dc812f7454ae22d7dac48034282f030408895886e9644179dcf66d93907cedd49e0c5752f755849953957143a033c398d81a69090a51ce63b29fe17925770fac12cf9e291200df6bb669d5a46dd74dd817ef2f9848f710c359afe73947afebdf5536ee2f9f3b19c5c90bbe7e93e42df3a673530796ff61c096cf1f571ab9737f4b1f7e9650823ca025a3ef04d97a5b7d92d3a29c2128513da5b483fa5da21b1459d0943665dc11d039bd5e0718577c95cb37b99974bc8be5c9c42d4da0a080e380fa7fe60153d81a4d947fbdb3b84465a098f8b99eeb4ec00000000000000000000000034d9b47e19cabfb1ff1f04e68580e64b66a0a54b9e3342a99d3332dab55483a5091542bf882772a92d18154e941a1473fef33d72345a985c6c58e005c7ad05c2fb6e743e986362541c4c49d5dae580fc6158bb384fa1a0b6e818473853557e383bdc58af5d684f82a11bacd74c78fa51f3d54cb84f7b7ebb2936b4e3a4a960e6f8f278296803d1e7f3fb0b9ddcbb22666bb443965d5354529865b228f9d4e297259690e612193ab51ed9e0094425f2ee160e9b091c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:00:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) [ 76.859484][ T5420] loop0: detected capacity change from 0 to 256 13:00:59 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, 'q5c', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2c11, 0x0, 0x2, [{0x5, 0x3, "179a39380ba4beab96b64c00b2b4d07287a67909ac68"}]}}}}}}, 0x0) 13:00:59 executing program 1: r0 = syz_io_uring_setup(0x321f, &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 13:01:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:01:00 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, 'q5c', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2c11, 0x0, 0x2, [{0x5, 0x3, "179a39380ba4beab96b64c00b2b4d07287a67909ac68"}]}}}}}}, 0x0) 13:01:00 executing program 1: r0 = syz_io_uring_setup(0x321f, &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 13:01:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:01:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:01:00 executing program 4: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:01:00 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5}, @IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL_INHERIT={0x5}]}}}]}, 0x50}}, 0x0) 13:01:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5}, @IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL_INHERIT={0x5}]}}}]}, 0x50}}, 0x0) 13:01:00 executing program 4: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:01:00 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5}, @IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL_INHERIT={0x5}]}}}]}, 0x50}}, 0x0) 13:01:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a67880141cca555077e3a15910e193dd2ff1fa7c3205bfedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b2e1a38d522be18bd11548b043ccc42646d25dfd73bb6d7535f7866907dc6751dfced1fd8accae66e8a0e4f653419e173a649c1cfd6587d47578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d566a0f06c54c3a4ccbdf31c4d4acef2ce3599f455c7a3a48a01010000009f2f0517e4ca0e1803a2971a50f713d4e21b3336f1ae0796f23526ec0fd900734c4c815bf697e6bd009d2e797ff6ff72ba8972b122b09789d99b3d0524f39dc09244ba5dbe9180950f76f7049db5cb19d7962fed44e00f39ed8c13a11fa798de504e0865cd81f2b77fdd76c677f812d249c8130b018d430454ffdca8b7fbc254f4348c8d7305000000000000593d60abc9b3e67d127e56f3d3759dcfeb820634fd4d419efaefb24305b2bea20007840484511b6efaad20633500000000e01446a6285f4665a7fe37da2349f8bf4064726dc32add75e0f435f28fbeda75cf971d54a9698cf3270f420edc85c176070bfff7909413f3fbd3ced3284db730b368ddca654dd7836f171b766ffd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914909187b6b0776952be5cb0417d33d3ab25494c18494d9d10d76e603129e9a726579ac7d672cacd581b7e2fc7a5758fcfb822de1dacc357341e000cc34c49914f1aa198a77b3610b5403930fd42051d4b7443e5b49c000000000000007d6173050027791c9c1e04ad3711a66d91254a6f911b1449c62a6e1e3f9ce19a9d1715c009a58e6eadac8f61b45853673df72dc812f7454ae22d7dac48034282f030408895886e9644179dcf66d93907cedd49e0c5752f755849953957143a033c398d81a69090a51ce63b29fe17925770fac12cf9e291200df6bb669d5a46dd74dd817ef2f9848f710c359afe73947afebdf5536ee2f9f3b19c5c90bbe7e93e42df3a673530796ff61c096cf1f571ab9737f4b1f7e9650823ca025a3ef04d97a5b7d92d3a29c2128513da5b483fa5da21b1459d0943665dc11d039bd5e0718577c95cb37b99974bc8be5c9c42d4da0a080e380fa7fe60153d81a4d947fbdb3b84465a098f8b99eeb4ec00000000000000000000000034d9b47e19cabfb1ff1f04e68580e64b66a0a54b9e3342a99d3332dab55483a5091542bf882772a92d18154e941a1473fef33d72345a985c6c58e005c7ad05c2fb6e743e986362541c4c49d5dae580fc6158bb384fa1a0b6e818473853557e383bdc58af5d684f82a11bacd74c78fa51f3d54cb84f7b7ebb2936b4e3a4a960e6f8f278296803d1e7f3fb0b9ddcbb22666bb443965d5354529865b228f9d4e297259690e612193ab51ed9e0094425f2ee160e9b091c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:01:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:01:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(0x0, 0x141001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000102"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030609100000000000004c9e000000020013000200002ddb11274e03f2bc0105000600200000000a000000000000340000000000f9800000000000310d0000000343c0f7b4000002000100f5000000000000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000282, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r7, 0x103}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x111) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) 13:01:01 executing program 4: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:01:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5}, @IFLA_GENEVE_LABEL={0x8}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL_INHERIT={0x5}]}}}]}, 0x50}}, 0x0) 13:01:01 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:01 executing program 4: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:01:01 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:02 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:02 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:03 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'nq\x00'}, 0x2c) 13:01:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b80)) syz_clone(0x40000000, &(0x7f0000000040)="2500ad18524502bbc063e13f37cdb6808d98c9cfdee53bb7d528e9a2fed2f26ac39496e7db24887066134a156c8436f4486712d50611e8d7809723022404c369abb84edc90d8cb0333079f75fb0daa519d04ee01b17901915c9e9456d194a22acec05ef353ede278e933dabca7ceb2cd868c5f4c196dcc6faa7ee0bbc84c0269ecbb3d35ae9867c9d8eb74e2344bf477cc8d0b54ab610f01ee98260c029e1ed1c334c6189bc19625d880f493db4af521e4f65cbf019e1a4e80", 0xb9, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="a1e628151f7df99271e06fcd442acfbcd3517b94fe533aa6e7568f49043e2369b9548c34c462b3216b2cd94539") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x8) 13:01:03 executing program 0: pipe(&(0x7f0000000fc0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 13:01:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="5400000010000100000000000000000010002900", @ANYRES32=0x0, @ANYBLOB="00000000000000000e0002009c0a0d0000000000280008801c000a0000000000000000000000000000000000000000000200000008001b"], 0x54}}, 0x0) 13:01:03 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, @none, 0x9}, 0xe) 13:01:03 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'nq\x00'}, 0x2c) 13:01:03 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000400)='cgroup\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:01:03 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, @none, 0x9}, 0xe) 13:01:03 executing program 0: pipe(&(0x7f0000000fc0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 13:01:03 executing program 0: pipe(&(0x7f0000000fc0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 13:01:03 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'nq\x00'}, 0x2c) 13:01:03 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, @none, 0x9}, 0xe) [ 80.927248][ T27] audit: type=1400 audit(1702040463.179:354): avc: denied { bind } for pid=5511 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 80.958482][ T5514] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1284}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 13:01:03 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, @none, 0x9}, 0xe) 13:01:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="5400000010000100000000000000000010002900", @ANYRES32=0x0, @ANYBLOB="00000000000000000e0002009c0a0d0000000000280008801c000a0000000000000000000000000000000000000000000200000008001b"], 0x54}}, 0x0) 13:01:03 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'nq\x00'}, 0x2c) 13:01:03 executing program 0: pipe(&(0x7f0000000fc0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 13:01:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b80)) syz_clone(0x40000000, &(0x7f0000000040)="2500ad18524502bbc063e13f37cdb6808d98c9cfdee53bb7d528e9a2fed2f26ac39496e7db24887066134a156c8436f4486712d50611e8d7809723022404c369abb84edc90d8cb0333079f75fb0daa519d04ee01b17901915c9e9456d194a22acec05ef353ede278e933dabca7ceb2cd868c5f4c196dcc6faa7ee0bbc84c0269ecbb3d35ae9867c9d8eb74e2344bf477cc8d0b54ab610f01ee98260c029e1ed1c334c6189bc19625d880f493db4af521e4f65cbf019e1a4e80", 0xb9, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="a1e628151f7df99271e06fcd442acfbcd3517b94fe533aa6e7568f49043e2369b9548c34c462b3216b2cd94539") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x8) 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1284}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 13:01:03 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000002, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005ac000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0x5, 0x8, 0x0) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) 13:01:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) [ 81.071327][ T5536] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1284}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) 13:01:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="5400000010000100000000000000000010002900", @ANYRES32=0x0, @ANYBLOB="00000000000000000e0002009c0a0d0000000000280008801c000a0000000000000000000000000000000000000000000200000008001b"], 0x54}}, 0x0) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) [ 81.135336][ T5549] mmap: syz-executor.0 (5549) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1284}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) 13:01:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="5400000010000100000000000000000010002900", @ANYRES32=0x0, @ANYBLOB="00000000000000000e0002009c0a0d0000000000280008801c000a0000000000000000000000000000000000000000000200000008001b"], 0x54}}, 0x0) [ 81.180587][ T5557] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 81.259928][ T5567] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 13:01:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b80)) syz_clone(0x40000000, &(0x7f0000000040)="2500ad18524502bbc063e13f37cdb6808d98c9cfdee53bb7d528e9a2fed2f26ac39496e7db24887066134a156c8436f4486712d50611e8d7809723022404c369abb84edc90d8cb0333079f75fb0daa519d04ee01b17901915c9e9456d194a22acec05ef353ede278e933dabca7ceb2cd868c5f4c196dcc6faa7ee0bbc84c0269ecbb3d35ae9867c9d8eb74e2344bf477cc8d0b54ab610f01ee98260c029e1ed1c334c6189bc19625d880f493db4af521e4f65cbf019e1a4e80", 0xb9, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="a1e628151f7df99271e06fcd442acfbcd3517b94fe533aa6e7568f49043e2369b9548c34c462b3216b2cd94539") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x8) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0xf1030000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) 13:01:03 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000002, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005ac000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0x5, 0x8, 0x0) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) 13:01:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) 13:01:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) 13:01:03 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x80284504, &(0x7f0000000100)={0x0, 0x0, 0x0}) 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0xf1030000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) 13:01:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) 13:01:03 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x400, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x9, r2}, 0x10) 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0xf1030000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) [ 81.475422][ T27] audit: type=1400 audit(1702040463.719:355): avc: denied { create } for pid=5586 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 81.495215][ T27] audit: type=1400 audit(1702040463.719:356): avc: denied { setopt } for pid=5586 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 81.518157][ T27] audit: type=1400 audit(1702040463.769:357): avc: denied { bind } for pid=5586 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 13:01:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) 13:01:03 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000002, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005ac000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0x5, 0x8, 0x0) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) 13:01:03 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x400, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x9, r2}, 0x10) 13:01:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0xf1030000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) 13:01:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) 13:01:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b80)) syz_clone(0x40000000, &(0x7f0000000040)="2500ad18524502bbc063e13f37cdb6808d98c9cfdee53bb7d528e9a2fed2f26ac39496e7db24887066134a156c8436f4486712d50611e8d7809723022404c369abb84edc90d8cb0333079f75fb0daa519d04ee01b17901915c9e9456d194a22acec05ef353ede278e933dabca7ceb2cd868c5f4c196dcc6faa7ee0bbc84c0269ecbb3d35ae9867c9d8eb74e2344bf477cc8d0b54ab610f01ee98260c029e1ed1c334c6189bc19625d880f493db4af521e4f65cbf019e1a4e80", 0xb9, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="a1e628151f7df99271e06fcd442acfbcd3517b94fe533aa6e7568f49043e2369b9548c34c462b3216b2cd94539") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x8) 13:01:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x34}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 13:01:04 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x400, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x9, r2}, 0x10) 13:01:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x34}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 13:01:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000086dd0500000000005400000060ec970001983a00fc000000000000000000000000000000ff020000000000000000000000000001000200000000000000000000000000000000000000000000860090780000000000000000000000000000ee7b615d00002b036f8c008275021d683910c309293188a7c747eb2278d27947840029442911892704b6"], 0xfdef) 13:01:04 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x400, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x9, r2}, 0x10) 13:01:04 executing program 3: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000002, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005ac000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0x5, 0x8, 0x0) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) 13:01:04 executing program 4: kexec_load(0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x12c824000}, {0x0, 0x0, 0x3e0000}], 0x0) 13:01:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x34}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 13:01:04 executing program 3: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x34}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 13:01:04 executing program 3: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 4: kexec_load(0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x12c824000}, {0x0, 0x0, 0x3e0000}], 0x0) 13:01:04 executing program 2: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 1: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 2: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 3: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 4: kexec_load(0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x12c824000}, {0x0, 0x0, 0x3e0000}], 0x0) 13:01:04 executing program 1: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 4: kexec_load(0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x12c824000}, {0x0, 0x0, 0x3e0000}], 0x0) 13:01:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 2: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 1: setresgid(0xee00, 0x0, 0xee00) r0 = syz_clone3(&(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 13:01:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x84bb594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xff, 0x5, 0x1f, 0x5, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x667, 0x800}, 0x0, 0x7fffffff, 0xfffff800, 0x5, 0x400, 0x5, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, r0, 0x0) r7 = syz_clone(0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x80000000, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8008, 0x0, @perf_bp={&(0x7f0000000840), 0x5}, 0x805, 0x0, 0x0, 0x5, 0xffffffff, 0xe1e, 0x0, 0x0, 0x101, 0x0, 0x7f}, r7, 0x0, 0xffffffffffffffff, 0xb) r8 = openat$cgroup_ro(r0, &(0x7f0000000200)='blkio.bfq.io_serviced\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x80, 0x3, 0x7, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x40, 0x7, 0x3, 0x7, 0xffffffffffffff99, 0x81, 0x9, 0x0, 0x3ff, 0x0, 0x9}, r7, 0x10, r8, 0x8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, 0x0, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 13:01:04 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x18) 13:01:04 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:04 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x18) [ 82.525130][ T27] audit: type=1400 audit(1702040464.769:358): avc: denied { bind } for pid=5709 comm="syz-executor.1" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 82.545905][ T27] audit: type=1400 audit(1702040464.769:359): avc: denied { node_bind } for pid=5709 comm="syz-executor.1" saddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 13:01:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4c}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffff8}]}) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') 13:01:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x18) 13:01:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4c}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffff8}]}) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') 13:01:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 13:01:04 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) [ 82.647948][ T27] audit: type=1400 audit(1702040464.899:360): avc: denied { read } for pid=5720 comm="syz-executor.3" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 82.658240][ T5723] __nla_validate_parse: 12 callbacks suppressed [ 82.658298][ T5723] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 13:01:05 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 13:01:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x18) 13:01:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4c}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffff8}]}) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') 13:01:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) [ 82.739176][ T27] audit: type=1400 audit(1702040464.899:361): avc: denied { open } for pid=5720 comm="syz-executor.3" path="/dev/ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 13:01:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4c}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffff8}]}) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') 13:01:05 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 13:01:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) [ 82.807646][ T5738] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 82.828564][ T27] audit: type=1400 audit(1702040464.989:362): avc: denied { getopt } for pid=5720 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 13:01:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 13:01:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) [ 82.906973][ T5752] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 82.937904][ T5757] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 82.960570][ T5755] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 13:01:05 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 13:01:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) [ 83.590124][ T5762] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 83.590553][ T5761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 83.600526][ T5768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 83.611965][ T5766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 13:01:05 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) [ 83.637107][ T5767] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 13:01:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:05 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0xe1) r1 = open(&(0x7f0000000180)='./bus\x00', 0x12103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) copy_file_range(r1, 0x0, r1, &(0x7f0000000080)=0x163, 0xb2, 0x0) 13:01:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x418, 0x220, 0x220, 0x0, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macvlan1\x00'}, 0xc0, 0x130}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr, @loopback}}}, {{@arp={@local, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'macvtap0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="83c3cdc255b4", @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'vxcan1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) 13:01:06 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 13:01:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304, 0x3a}, "93db195cfbb3ee8f", "a3a0f8e9ea7b14bb95b67737d0ac3c81b88a913c923a51e018dece5008d7868c", "857790e2", "33d87fb97f25ceae"}, 0x38) 13:01:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x418, 0x220, 0x220, 0x0, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macvlan1\x00'}, 0xc0, 0x130}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr, @loopback}}}, {{@arp={@local, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'macvtap0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="83c3cdc255b4", @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'vxcan1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) 13:01:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 13:01:06 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="4918d534000000000000006f154a65df29b1ef102a5f61c5af4c4f24b6a933e8274ba1414050bd5644325e0bb4073ac5c2fee0ada2c76d4c38c1bd1ba3cb016ee2934ea2e644e036f7bbada837e3f46a5bd83dd39a25af1d48394f2b8d3776a6ef52871563d2e13219374dda00"/134, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000480)={0x0, r7, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r3, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r9 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000a07514c7bb3c4e565d"], 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r9}, 0x1) openat$cgroup_procs(r10, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r11 = openat$cgroup(r10, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r12 = openat$cgroup_ro(r11, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r8, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) 13:01:06 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0xe1) r1 = open(&(0x7f0000000180)='./bus\x00', 0x12103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) copy_file_range(r1, 0x0, r1, &(0x7f0000000080)=0x163, 0xb2, 0x0) 13:01:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 13:01:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x418, 0x220, 0x220, 0x0, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macvlan1\x00'}, 0xc0, 0x130}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr, @loopback}}}, {{@arp={@local, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'macvtap0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="83c3cdc255b4", @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'vxcan1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) 13:01:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304, 0x3a}, "93db195cfbb3ee8f", "a3a0f8e9ea7b14bb95b67737d0ac3c81b88a913c923a51e018dece5008d7868c", "857790e2", "33d87fb97f25ceae"}, 0x38) 13:01:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 13:01:06 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0xe1) r1 = open(&(0x7f0000000180)='./bus\x00', 0x12103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) copy_file_range(r1, 0x0, r1, &(0x7f0000000080)=0x163, 0xb2, 0x0) 13:01:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304, 0x3a}, "93db195cfbb3ee8f", "a3a0f8e9ea7b14bb95b67737d0ac3c81b88a913c923a51e018dece5008d7868c", "857790e2", "33d87fb97f25ceae"}, 0x38) 13:01:07 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 13:01:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@dev}}]}, 0x154}}, 0x0) 13:01:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x418, 0x220, 0x220, 0x0, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'macvlan1\x00'}, 0xc0, 0x130}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr, @loopback}}}, {{@arp={@local, @local, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'macvtap0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="83c3cdc255b4", @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'vxcan1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) 13:01:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 13:01:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304, 0x3a}, "93db195cfbb3ee8f", "a3a0f8e9ea7b14bb95b67737d0ac3c81b88a913c923a51e018dece5008d7868c", "857790e2", "33d87fb97f25ceae"}, 0x38) 13:01:07 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0xe1) r1 = open(&(0x7f0000000180)='./bus\x00', 0x12103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) copy_file_range(r1, 0x0, r1, &(0x7f0000000080)=0x163, 0xb2, 0x0) 13:01:07 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000540), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000015000000090014002e5d245e2f00000008000100", @ANYRES32], 0x28}}, 0x0) 13:01:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x34, 0x24, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}}, 0x0) 13:01:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@dev}}]}, 0x154}}, 0x0) 13:01:07 executing program 3: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c40)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000003cc0)={&(0x7f0000003c80)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 13:01:07 executing program 3: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c40)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000003cc0)={&(0x7f0000003c80)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) [ 85.405993][ T5829] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 85.424065][ T27] audit: type=1400 audit(1702040467.669:363): avc: denied { ioctl } for pid=5836 comm="syz-executor.3" path="socket:[13413]" dev="sockfs" ino=13413 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 13:01:08 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000540), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000015000000090014002e5d245e2f00000008000100", @ANYRES32], 0x28}}, 0x0) 13:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x34, 0x24, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}}, 0x0) 13:01:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@dev}}]}, 0x154}}, 0x0) 13:01:08 executing program 3: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c40)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000003cc0)={&(0x7f0000003c80)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 13:01:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000540), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000015000000090014002e5d245e2f00000008000100", @ANYRES32], 0x28}}, 0x0) 13:01:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@empty, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@dev}}]}, 0x154}}, 0x0) 13:01:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000540), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000015000000090014002e5d245e2f00000008000100", @ANYRES32], 0x28}}, 0x0) 13:01:08 executing program 3: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c40)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000003cc0)={&(0x7f0000003c80)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 13:01:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 13:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x34, 0x24, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}}, 0x0) [ 86.225267][ T5851] netlink: 'syz-executor.2': attribute type 21 has an invalid length. [ 86.233583][ T5854] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 13:01:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:08 executing program 3: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 13:01:08 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:08 executing program 4: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x1, 0x4, 0x101}, 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd13d8647dbfe4732}) io_setup(0x20fe, &(0x7f00000001c0)=0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) io_submit(r1, 0x1, &(0x7f0000001a40)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000180), 0xe}]) 13:01:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 13:01:08 executing program 3: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 13:01:08 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x34, 0x24, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}}, 0x0) [ 86.325982][ T5871] netlink: 'syz-executor.2': attribute type 21 has an invalid length. [ 86.341786][ T5874] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 13:01:08 executing program 3: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000c0000000401a80016000400014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x81009431, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 13:01:08 executing program 3: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 5: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 4: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x1, 0x4, 0x101}, 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd13d8647dbfe4732}) io_setup(0x20fe, &(0x7f00000001c0)=0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) io_submit(r1, 0x1, &(0x7f0000001a40)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000180), 0xe}]) 13:01:08 executing program 0: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 13:01:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000005400)={0x10, 0x0, 0x25dfdbfd}, 0xc) bind$netlink(r0, &(0x7f0000001140)={0x10, 0x0, 0x25dfdbfd, 0x4010021}, 0xc) [ 86.422699][ T5895] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 86.447108][ T5896] netlink: 'syz-executor.2': attribute type 21 has an invalid length. 13:01:08 executing program 5: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 0: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 13:01:08 executing program 0: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 5: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 13:01:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000005400)={0x10, 0x0, 0x25dfdbfd}, 0xc) bind$netlink(r0, &(0x7f0000001140)={0x10, 0x0, 0x25dfdbfd, 0x4010021}, 0xc) 13:01:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x40012063) 13:01:08 executing program 5: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000240)='GPL\x00', 0x5, 0xfd, &(0x7f0000000280)=""/253}, 0x90) 13:01:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 13:01:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x40012063) 13:01:08 executing program 4: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x1, 0x4, 0x101}, 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd13d8647dbfe4732}) io_setup(0x20fe, &(0x7f00000001c0)=0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) io_submit(r1, 0x1, &(0x7f0000001a40)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000180), 0xe}]) 13:01:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000005400)={0x10, 0x0, 0x25dfdbfd}, 0xc) bind$netlink(r0, &(0x7f0000001140)={0x10, 0x0, 0x25dfdbfd, 0x4010021}, 0xc) 13:01:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x40012063) 13:01:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000005400)={0x10, 0x0, 0x25dfdbfd}, 0xc) bind$netlink(r0, &(0x7f0000001140)={0x10, 0x0, 0x25dfdbfd, 0x4010021}, 0xc) 13:01:09 executing program 5: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000240)='GPL\x00', 0x5, 0xfd, &(0x7f0000000280)=""/253}, 0x90) 13:01:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 13:01:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x40012063) 13:01:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e6", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:09 executing program 4: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x1, 0x4, 0x101}, 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd13d8647dbfe4732}) io_setup(0x20fe, &(0x7f00000001c0)=0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) io_submit(r1, 0x1, &(0x7f0000001a40)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000180), 0xe}]) 13:01:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x7}]}, 0x20}}, 0x0) 13:01:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:09 executing program 5: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000240)='GPL\x00', 0x5, 0xfd, &(0x7f0000000280)=""/253}, 0x90) 13:01:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x7}]}, 0x20}}, 0x0) 13:01:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x7}]}, 0x20}}, 0x0) 13:01:09 executing program 5: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000240)='GPL\x00', 0x5, 0xfd, &(0x7f0000000280)=""/253}, 0x90) 13:01:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x7}]}, 0x20}}, 0x0) 13:01:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:01:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:01:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:01:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:01:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000004c0)=0x72) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e6", 0x1e0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84}, 0x41) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x90) 13:01:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00', r2}, 0x16) write$tun(r0, &(0x7f0000000c80)={@void, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x10, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@private}, {@private}, {}, {@remote}, {@loopback}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x66) 13:01:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x20017, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f00000001c0), &(0x7f0000000280)=@udp6=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100), 0x0}, 0x20) 13:01:12 executing program 4: r0 = syz_io_uring_setup(0x6d18, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4, &(0x7f0000001440)=[{0x0}], 0x1) 13:01:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstopts={{0x18, 0x29, 0x3b}}, @hoplimit_2292={{0x14}}], 0x30}, 0x0) 13:01:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) fstat(r0, &(0x7f00000042c0)) 13:01:12 executing program 2: bpf$MAP_CREATE(0x24000000000000, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 13:01:12 executing program 4: r0 = syz_io_uring_setup(0x6d18, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4, &(0x7f0000001440)=[{0x0}], 0x1) 13:01:12 executing program 5: r0 = syz_open_procfs$pagemap(0x0, &(0x7f00000012c0)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000000)={0x60, 0x0, &(0x7f0000002000/0x4000)=nil, &(0x7f0000004000/0x3000)=nil, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x60}) 13:01:12 executing program 0: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x30}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000/0x2000)=nil, 0x2000}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:12 executing program 5: r0 = syz_open_procfs$pagemap(0x0, &(0x7f00000012c0)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000000)={0x60, 0x0, &(0x7f0000002000/0x4000)=nil, &(0x7f0000004000/0x3000)=nil, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x60}) 13:01:12 executing program 0: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x30}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000/0x2000)=nil, 0x2000}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, 0x10, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0xad, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x24}}, 0x0) 13:01:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstopts={{0x18, 0x29, 0x3b}}, @hoplimit_2292={{0x14}}], 0x30}, 0x0) 13:01:12 executing program 4: r0 = syz_io_uring_setup(0x6d18, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4, &(0x7f0000001440)=[{0x0}], 0x1) 13:01:12 executing program 5: r0 = syz_open_procfs$pagemap(0x0, &(0x7f00000012c0)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000000)={0x60, 0x0, &(0x7f0000002000/0x4000)=nil, &(0x7f0000004000/0x3000)=nil, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x60}) 13:01:12 executing program 4: r0 = syz_io_uring_setup(0x6d18, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4, &(0x7f0000001440)=[{0x0}], 0x1) 13:01:12 executing program 2: bpf$MAP_CREATE(0x24000000000000, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 13:01:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstopts={{0x18, 0x29, 0x3b}}, @hoplimit_2292={{0x14}}], 0x30}, 0x0) 13:01:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, 0x10, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0xad, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x24}}, 0x0) 13:01:12 executing program 0: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x30}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000/0x2000)=nil, 0x2000}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:12 executing program 5: r0 = syz_open_procfs$pagemap(0x0, &(0x7f00000012c0)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000000)={0x60, 0x0, &(0x7f0000002000/0x4000)=nil, &(0x7f0000004000/0x3000)=nil, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x60}) [ 90.066150][ T6055] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 13:01:12 executing program 4: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0) 13:01:12 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x2, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@p, {}, {}, {0x7, 0x0, 0x0, 0x0}}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x51, &(0x7f0000000180)=""/81}, 0x90) 13:01:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstopts={{0x18, 0x29, 0x3b}}, @hoplimit_2292={{0x14}}], 0x30}, 0x0) 13:01:12 executing program 4: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0) 13:01:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, 0x10, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0xad, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x24}}, 0x0) 13:01:12 executing program 0: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x30}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000/0x2000)=nil, 0x2000}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:12 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x2, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@p, {}, {}, {0x7, 0x0, 0x0, 0x0}}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x51, &(0x7f0000000180)=""/81}, 0x90) [ 90.134399][ T6066] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 90.200867][ T6083] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 13:01:12 executing program 2: bpf$MAP_CREATE(0x24000000000000, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 13:01:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, 0x10, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0xad, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0x24}}, 0x0) 13:01:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x77, &(0x7f0000000340), 0x8) 13:01:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, 0x9, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 13:01:12 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x2, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@p, {}, {}, {0x7, 0x0, 0x0, 0x0}}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x51, &(0x7f0000000180)=""/81}, 0x90) 13:01:12 executing program 4: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0) 13:01:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, 0x9, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 13:01:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x77, &(0x7f0000000340), 0x8) 13:01:12 executing program 4: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0) 13:01:12 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x2, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@p, {}, {}, {0x7, 0x0, 0x0, 0x0}}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x51, &(0x7f0000000180)=""/81}, 0x90) 13:01:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, 0x9, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 13:01:12 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) [ 90.291099][ T6090] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 13:01:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, 0x9, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 13:01:12 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 13:01:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:12 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:01:12 executing program 2: bpf$MAP_CREATE(0x24000000000000, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 13:01:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x77, &(0x7f0000000340), 0x8) 13:01:12 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:01:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x77, &(0x7f0000000340), 0x8) 13:01:12 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:01:12 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 90.448376][ T27] audit: type=1400 audit(1702040472.699:364): avc: denied { mount } for pid=6113 comm="syz-executor.4" name="/" dev="configfs" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 90.481527][ T27] audit: type=1400 audit(1702040472.729:365): avc: denied { read } for pid=6113 comm="syz-executor.4" name="/" dev="configfs" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 90.503847][ T27] audit: type=1400 audit(1702040472.729:366): avc: denied { open } for pid=6113 comm="syz-executor.4" path="/root/syzkaller-testdir1949819546/syzkaller.5pz8kk/197/file0" dev="configfs" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 90.524077][ T6118] loop5: detected capacity change from 0 to 8192 13:01:12 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:01:12 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) [ 90.540238][ T27] audit: type=1400 audit(1702040472.749:367): avc: denied { unmount } for pid=3133 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 13:01:12 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 13:01:12 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:01:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000000)='\x93', 0x0) ftruncate(r0, 0x9) 13:01:13 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 13:01:13 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r0, 0x705, 0x0, 0x0, {{}, {@void, @val={0x4}}}}, 0x20}}, 0x0) 13:01:13 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 13:01:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000000)='\x93', 0x0) ftruncate(r0, 0x9) 13:01:13 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 13:01:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:13 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r0, 0x705, 0x0, 0x0, {{}, {@void, @val={0x4}}}}, 0x20}}, 0x0) [ 91.305966][ T6149] netlink: 'syz-executor.2': attribute type 153 has an invalid length. 13:01:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000000)='\x93', 0x0) ftruncate(r0, 0x9) 13:01:13 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r0, 0x705, 0x0, 0x0, {{}, {@void, @val={0x4}}}}, 0x20}}, 0x0) [ 91.420901][ T6153] netlink: 'syz-executor.2': attribute type 153 has an invalid length. 13:01:13 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 13:01:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac858000000000000000246e0deb57d4e13cc9bc596ad10a48b243ccc42606d25d2399aa1efd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c1165a0e36b7cc957d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af23b1ce935b0f327cb3f011a7d069311d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb03109753f541cd027edd68154ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000100002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b223fa8b148871c8d31d24291c25449f106a99893ed20fa7a050fbbef90327e827e513e96068fd1e8a43e89f9c050022a961546ed5365470fa503c1fac35b903e10c62bebc943c17ff1432d0881406bc176e3e69ee52b59d13182e1f24ed200ada12f7a1525320e71666f472a97292c9be884dd30ed5eb1affb87ba55b2d72078e9f40e4ffff06aabca77e64c988dd413230d68c78a15be9771bf00a7f7681314df1c2abe69cb47be5329ac624fb2997df9e6867583a4b239d17ba83b4973cd9bcddd186acbc7a967e41f61fe4382601bff5f5dbcc3d50a065bcc67943bae4f2a5366ca6d291f931d9cde41bdabdae4717317621abaa7179e2d44f8ebca654f9e45719b70d2c49769e309fc99f6306000000000000009804c2653d19462139d5c505dc6e4f178c9a098b51333cccfe0d2eb41dd079de3cfa60365787ca4b8eb920b728046e2d8699b7eda06969c5da49fc870a3d35fb2b28fd67850071d524ebab891f8b1214e48921b7d4dadb6d95d30131ef13281ea9e02dfbca8c2bb32eee9a283441c8d1fd3d33c812c0988f7643b2107c6bdb38d136628774e28052ce9ea47918b114575a167b77ed6de6886b6451b72c896dd54716383497f09e3000d14999ec58ec7bff881dec937df15a8ddff04cdd4167024d7c1ddc1c09000000000000001ef98cc2571fa05f5283c8b9e20bbca82b47b013e3d90000000000000000000000024286aea566c6a385567bfb4e48ba0e0c79518510dff5bfadc99d76b32e7f7d0de891eaf88fa161e42c3b89f4b4eb7da665fdc1139a2e7538e80c99c3eaec703856a1c1a41d3c214ae728bfa68f907ca9deff45d9d56c5e94be448d5f0eb0b413abe85eea0a38f4482c430be3e5426e8e2618c6a2634e97d3d34fe39dd016d4de4a44e69d4cb830c2b924f0745548f675a407fcae1d04d1a197d1bd74deafc2f256ef13ac00000000000000000000000000139950e7c527dca831439208c087b0c72cc6f1bef5200ba58165734454c056c6c29725f8084d2c074f36c4b7fbca1b5eed13bb78513f1bdb476a19dcc9810d54a081075a0cec2bdc1e0ab5cb815e06d85c936f813539354d7b9c228e971579125e8979af3329b9984783075f3fcf49a5d2f9840407f279b66d3a28f8a897027a006ded3e151522540e7ef6f8a19b90e183b31901836548fbfe6cb5e49561a89c1b57c7fab15f36ed00eea4174c1dfcf6fbc062bcad15ffd087e4eb641b8871c551a96526f59a15feb36e60e4e7d8187914cbe85b693181dd290c47ef9bfbd3280c9e2658f50b7c64b6c9b5783846cb2762dd680abe9c080832443c9e7fc4474e3008d4821997cc3f132cc8caf0a555cc32e6632a659c30e7066561813ee13397484f1414fad889e594fe22b1c60b654c6c187a2799ef0b349206957635"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:13 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000000)='\x93', 0x0) ftruncate(r0, 0x9) 13:01:13 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r0, 0x705, 0x0, 0x0, {{}, {@void, @val={0x4}}}}, 0x20}}, 0x0) [ 91.498094][ T6155] loop4: detected capacity change from 0 to 8192 [ 91.510792][ T6158] loop5: detected capacity change from 0 to 8192 [ 91.535248][ T6165] netlink: 'syz-executor.2': attribute type 153 has an invalid length. [ 91.638209][ T6176] netlink: 'syz-executor.2': attribute type 153 has an invalid length. 13:01:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) [ 92.381332][ T6181] loop4: detected capacity change from 0 to 8192 13:01:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac858000000000000000246e0deb57d4e13cc9bc596ad10a48b243ccc42606d25d2399aa1efd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c1165a0e36b7cc957d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af23b1ce935b0f327cb3f011a7d069311d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb03109753f541cd027edd68154ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000100002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b223fa8b148871c8d31d24291c25449f106a99893ed20fa7a050fbbef90327e827e513e96068fd1e8a43e89f9c050022a961546ed5365470fa503c1fac35b903e10c62bebc943c17ff1432d0881406bc176e3e69ee52b59d13182e1f24ed200ada12f7a1525320e71666f472a97292c9be884dd30ed5eb1affb87ba55b2d72078e9f40e4ffff06aabca77e64c988dd413230d68c78a15be9771bf00a7f7681314df1c2abe69cb47be5329ac624fb2997df9e6867583a4b239d17ba83b4973cd9bcddd186acbc7a967e41f61fe4382601bff5f5dbcc3d50a065bcc67943bae4f2a5366ca6d291f931d9cde41bdabdae4717317621abaa7179e2d44f8ebca654f9e45719b70d2c49769e309fc99f6306000000000000009804c2653d19462139d5c505dc6e4f178c9a098b51333cccfe0d2eb41dd079de3cfa60365787ca4b8eb920b728046e2d8699b7eda06969c5da49fc870a3d35fb2b28fd67850071d524ebab891f8b1214e48921b7d4dadb6d95d30131ef13281ea9e02dfbca8c2bb32eee9a283441c8d1fd3d33c812c0988f7643b2107c6bdb38d136628774e28052ce9ea47918b114575a167b77ed6de6886b6451b72c896dd54716383497f09e3000d14999ec58ec7bff881dec937df15a8ddff04cdd4167024d7c1ddc1c09000000000000001ef98cc2571fa05f5283c8b9e20bbca82b47b013e3d90000000000000000000000024286aea566c6a385567bfb4e48ba0e0c79518510dff5bfadc99d76b32e7f7d0de891eaf88fa161e42c3b89f4b4eb7da665fdc1139a2e7538e80c99c3eaec703856a1c1a41d3c214ae728bfa68f907ca9deff45d9d56c5e94be448d5f0eb0b413abe85eea0a38f4482c430be3e5426e8e2618c6a2634e97d3d34fe39dd016d4de4a44e69d4cb830c2b924f0745548f675a407fcae1d04d1a197d1bd74deafc2f256ef13ac00000000000000000000000000139950e7c527dca831439208c087b0c72cc6f1bef5200ba58165734454c056c6c29725f8084d2c074f36c4b7fbca1b5eed13bb78513f1bdb476a19dcc9810d54a081075a0cec2bdc1e0ab5cb815e06d85c936f813539354d7b9c228e971579125e8979af3329b9984783075f3fcf49a5d2f9840407f279b66d3a28f8a897027a006ded3e151522540e7ef6f8a19b90e183b31901836548fbfe6cb5e49561a89c1b57c7fab15f36ed00eea4174c1dfcf6fbc062bcad15ffd087e4eb641b8871c551a96526f59a15feb36e60e4e7d8187914cbe85b693181dd290c47ef9bfbd3280c9e2658f50b7c64b6c9b5783846cb2762dd680abe9c080832443c9e7fc4474e3008d4821997cc3f132cc8caf0a555cc32e6632a659c30e7066561813ee13397484f1414fad889e594fe22b1c60b654c6c187a2799ef0b349206957635"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) [ 92.514928][ T6189] loop5: detected capacity change from 0 to 8192 13:01:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac858000000000000000246e0deb57d4e13cc9bc596ad10a48b243ccc42606d25d2399aa1efd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c1165a0e36b7cc957d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af23b1ce935b0f327cb3f011a7d069311d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb03109753f541cd027edd68154ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000100002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b223fa8b148871c8d31d24291c25449f106a99893ed20fa7a050fbbef90327e827e513e96068fd1e8a43e89f9c050022a961546ed5365470fa503c1fac35b903e10c62bebc943c17ff1432d0881406bc176e3e69ee52b59d13182e1f24ed200ada12f7a1525320e71666f472a97292c9be884dd30ed5eb1affb87ba55b2d72078e9f40e4ffff06aabca77e64c988dd413230d68c78a15be9771bf00a7f7681314df1c2abe69cb47be5329ac624fb2997df9e6867583a4b239d17ba83b4973cd9bcddd186acbc7a967e41f61fe4382601bff5f5dbcc3d50a065bcc67943bae4f2a5366ca6d291f931d9cde41bdabdae4717317621abaa7179e2d44f8ebca654f9e45719b70d2c49769e309fc99f6306000000000000009804c2653d19462139d5c505dc6e4f178c9a098b51333cccfe0d2eb41dd079de3cfa60365787ca4b8eb920b728046e2d8699b7eda06969c5da49fc870a3d35fb2b28fd67850071d524ebab891f8b1214e48921b7d4dadb6d95d30131ef13281ea9e02dfbca8c2bb32eee9a283441c8d1fd3d33c812c0988f7643b2107c6bdb38d136628774e28052ce9ea47918b114575a167b77ed6de6886b6451b72c896dd54716383497f09e3000d14999ec58ec7bff881dec937df15a8ddff04cdd4167024d7c1ddc1c09000000000000001ef98cc2571fa05f5283c8b9e20bbca82b47b013e3d90000000000000000000000024286aea566c6a385567bfb4e48ba0e0c79518510dff5bfadc99d76b32e7f7d0de891eaf88fa161e42c3b89f4b4eb7da665fdc1139a2e7538e80c99c3eaec703856a1c1a41d3c214ae728bfa68f907ca9deff45d9d56c5e94be448d5f0eb0b413abe85eea0a38f4482c430be3e5426e8e2618c6a2634e97d3d34fe39dd016d4de4a44e69d4cb830c2b924f0745548f675a407fcae1d04d1a197d1bd74deafc2f256ef13ac00000000000000000000000000139950e7c527dca831439208c087b0c72cc6f1bef5200ba58165734454c056c6c29725f8084d2c074f36c4b7fbca1b5eed13bb78513f1bdb476a19dcc9810d54a081075a0cec2bdc1e0ab5cb815e06d85c936f813539354d7b9c228e971579125e8979af3329b9984783075f3fcf49a5d2f9840407f279b66d3a28f8a897027a006ded3e151522540e7ef6f8a19b90e183b31901836548fbfe6cb5e49561a89c1b57c7fab15f36ed00eea4174c1dfcf6fbc062bcad15ffd087e4eb641b8871c551a96526f59a15feb36e60e4e7d8187914cbe85b693181dd290c47ef9bfbd3280c9e2658f50b7c64b6c9b5783846cb2762dd680abe9c080832443c9e7fc4474e3008d4821997cc3f132cc8caf0a555cc32e6632a659c30e7066561813ee13397484f1414fad889e594fe22b1c60b654c6c187a2799ef0b349206957635"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) [ 92.600269][ T6194] loop0: detected capacity change from 0 to 8192 13:01:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000007f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) close(r0) 13:01:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:15 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) [ 92.919655][ T6210] loop2: detected capacity change from 0 to 8192 13:01:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:15 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) 13:01:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:15 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) 13:01:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:15 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) [ 93.442958][ T6218] loop4: detected capacity change from 0 to 8192 13:01:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1b, &(0x7f0000000080)=""/27, 0x0, 0x1}, 0x90) 13:01:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1b, &(0x7f0000000080)=""/27, 0x0, 0x1}, 0x90) 13:01:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1b, &(0x7f0000000080)=""/27, 0x0, 0x1}, 0x90) [ 93.553989][ T6223] loop5: detected capacity change from 0 to 8192 [ 93.620480][ T6229] loop0: detected capacity change from 0 to 8192 13:01:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2dc5c07001a000100000000897b2a1d84f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f069d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d3f00d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbe1f000000000000007e15f9b683e63cfff7c638bca835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c25bb2183634a33b18c4b459f9aea5ab222d7060000000000665106000000a803d1b56126efec0225a5433883b0d17cb21dbfd886caf2624e7f00da0ef9893ef57c79a182dceca9c46a9f8b001e53b29c0c698ed30d8942e94ac057bde74e42021d895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b52c8422295fde5626cd43fb43fb3acf9b2e840713cba86d43a570ee3589b7e9000000000000000000000000000000dc85131317c56465978d957d000000000000000000000000000000000000000000000000000000000000000000301171e8e3a2d0c842c20fd293c073b93f7662fad1f4ae3e1fe359aa29a4b8965229fa06b0fb2e23d2644cfbdbd6929aa42151ea48334743ad0c378641e74d55d6cd7b098599190100000055ec9c0c26b71588d6fc97e3098fb0e778be446659cf665e7f848d85de70c3c426a539a9a0e92e7bbf77528053dcb3b791b8e3faae507a3b721b670b06b78bb09e82ecc85a4bbc596d8ce02a2cbede5573f8bdc84d61c5634fffa50e74ec0f2da4f3d82c2d2b5a20ec152df14481c3bb59a23e014d07fc070d87f58118f468bf80283e0ce7efda7906f9c53319aef22e01a9ba5649fc10fb5b8132dcf42c47a4b79efb9f720ebd2dcc1634f870cee6201bc0ad9e17c4633a17de505bed8fded3053cb455636132bdae3239b9c8b437256ac21a49c4f03b268c47e9becbaff440728429f9e0b0222485188b745b3c871d01d27eb4e5e00bcd79b95601098e044345a8aaa12fda56277aef89192b9af038ab8808a2adf0c3a15ec863e5f352c7967607cede40848eae2704701b7af0a0b30e9e5b76f45500000000000000", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1b, &(0x7f0000000080)=""/27, 0x0, 0x1}, 0x90) 13:01:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_mpls={0x64, 0x1, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x5}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_TTL={0x5, 0x7, 0x5}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) [ 93.883279][ T6242] loop2: detected capacity change from 0 to 8192 13:01:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_mpls={0x64, 0x1, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x5}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_TTL={0x5, 0x7, 0x5}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) 13:01:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_mpls={0x64, 0x1, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x5}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_TTL={0x5, 0x7, 0x5}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) 13:01:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_mpls={0x64, 0x1, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x5}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_TTL={0x5, 0x7, 0x5}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) 13:01:16 executing program 1: creat(&(0x7f0000001640)='./bus\x00', 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) gettid() timer_create(0x0, 0x0, &(0x7f0000000300)) [ 94.617343][ T6262] loop0: detected capacity change from 0 to 8192 [ 94.726944][ T6262] ================================================================== [ 94.735074][ T6262] BUG: KCSAN: data-race in mark_buffer_dirty_inode / mark_buffer_dirty_inode [ 94.743878][ T6262] [ 94.746220][ T6262] write to 0xffff888100592c88 of 8 bytes by task 6273 on cpu 0: [ 94.753860][ T6262] mark_buffer_dirty_inode+0x190/0x1c0 [ 94.759334][ T6262] fat_mirror_bhs+0x247/0x340 [ 94.764020][ T6262] fat_alloc_clusters+0x973/0xa60 [ 94.769054][ T6262] fat_get_block+0x25c/0x5e0 [ 94.773648][ T6262] __block_write_begin_int+0x3b7/0xf40 [ 94.779108][ T6262] block_write_begin+0x7b/0x170 [ 94.783964][ T6262] cont_write_begin+0x479/0x690 [ 94.788822][ T6262] fat_write_begin+0x61/0xf0 [ 94.793424][ T6262] generic_perform_write+0x1c9/0x410 [ 94.798707][ T6262] __generic_file_write_iter+0xa1/0x120 [ 94.804255][ T6262] generic_file_write_iter+0x7d/0x1c0 [ 94.809639][ T6262] do_iter_write+0x4ad/0x770 [ 94.814248][ T6262] vfs_iter_write+0x56/0x70 [ 94.818850][ T6262] iter_file_splice_write+0x462/0x7e0 [ 94.824249][ T6262] direct_splice_actor+0x8a/0xb0 [ 94.829209][ T6262] splice_direct_to_actor+0x31d/0x690 [ 94.835283][ T6262] do_splice_direct+0x10d/0x190 [ 94.840231][ T6262] do_sendfile+0x3c4/0x980 [ 94.844669][ T6262] __x64_sys_sendfile64+0xbd/0x150 [ 94.849811][ T6262] do_syscall_64+0x44/0x110 [ 94.854339][ T6262] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 94.860247][ T6262] [ 94.862565][ T6262] read to 0xffff888100592c88 of 8 bytes by task 6262 on cpu 1: [ 94.870104][ T6262] mark_buffer_dirty_inode+0x96/0x1c0 [ 94.875494][ T6262] fat_mirror_bhs+0x247/0x340 [ 94.880185][ T6262] fat_alloc_clusters+0x973/0xa60 [ 94.885318][ T6262] fat_get_block+0x25c/0x5e0 [ 94.889923][ T6262] __block_write_begin_int+0x3b7/0xf40 [ 94.895408][ T6262] block_write_begin+0x7b/0x170 [ 94.900279][ T6262] cont_write_begin+0x479/0x690 [ 94.905228][ T6262] fat_write_begin+0x61/0xf0 [ 94.909836][ T6262] generic_perform_write+0x1c9/0x410 [ 94.915135][ T6262] __generic_file_write_iter+0xa1/0x120 [ 94.920682][ T6262] generic_file_write_iter+0x7d/0x1c0 [ 94.926066][ T6262] vfs_write+0x48a/0x790 [ 94.930311][ T6262] ksys_write+0xeb/0x1a0 [ 94.934548][ T6262] __x64_sys_write+0x42/0x50 [ 94.939223][ T6262] do_syscall_64+0x44/0x110 [ 94.943739][ T6262] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 94.949631][ T6262] [ 94.951943][ T6262] value changed: 0x0000000000000000 -> 0xffff888106718210 [ 94.959034][ T6262] [ 94.961337][ T6262] Reported by Kernel Concurrency Sanitizer on: [ 94.967461][ T6262] CPU: 1 PID: 6262 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-00111-g5e3f5b81de80 #0 13:01:17 executing program 1: creat(&(0x7f0000001640)='./bus\x00', 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) gettid() timer_create(0x0, 0x0, &(0x7f0000000300)) 13:01:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7f06) 13:01:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) [ 94.977849][ T6262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 94.989651][ T6262] ================================================================== [ 95.212235][ T6283] loop2: detected capacity change from 0 to 8192 13:01:17 executing program 1: creat(&(0x7f0000001640)='./bus\x00', 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) gettid() timer_create(0x0, 0x0, &(0x7f0000000300)) 13:01:17 executing program 0: r0 = memfd_create(&(0x7f00000014c0)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) 13:01:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x0, 0x8000}}) 13:01:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 1: llistxattr(0x0, 0x0, 0x0) 13:01:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000084e27fa40000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 13:01:18 executing program 1: llistxattr(0x0, 0x0, 0x0) 13:01:18 executing program 1: llistxattr(0x0, 0x0, 0x0) 13:01:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000084e27fa40000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 13:01:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 1: llistxattr(0x0, 0x0, 0x0) 13:01:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000440)=""/218, 0x38, 0xda, 0xa}, 0x20) 13:01:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000084e27fa40000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 13:01:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000084e27fa40000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 13:01:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 5: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000440)=""/218, 0x38, 0xda, 0xa}, 0x20) 13:01:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000084e27fa40000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 13:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000440)=""/218, 0x38, 0xda, 0xa}, 0x20) 13:01:18 executing program 5: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000084e27fa40000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r1, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, {0x0, 0x0, 0x0, 0x0, 0x0}], 0x2) 13:01:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xa0702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0xe102}) write$tun(r0, &(0x7f0000001080)={@val, @val, @llc={@llc={0x0, 0x0, "0e"}}}, 0x11) 13:01:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000440)=""/218, 0x38, 0xda, 0xa}, 0x20) 13:01:18 executing program 5: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 5: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001240), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000364007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000080000000000b0000000800010075333200200002"], 0x4c}}, 0x0) 13:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x38, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x38}}, 0x0) 13:01:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 3: keyctl$get_keyring_id(0x0, 0x0, 0x0) 13:01:18 executing program 5: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 13:01:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001240), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000364007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000080000000000b0000000800010075333200200002"], 0x4c}}, 0x0) [ 96.505415][ T6382] __nla_validate_parse: 10 callbacks suppressed [ 96.505428][ T6382] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 96.530164][ T6386] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 96.541101][ T6382] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:01:18 executing program 2: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r2 = memfd_secret(0x0) ftruncate(r2, 0x5) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r1, &(0x7f00000001c0)=@IORING_OP_MSG_RING={0x28, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x38, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x38}}, 0x0) 13:01:18 executing program 3: keyctl$get_keyring_id(0x0, 0x0, 0x0) 13:01:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @loopback, {[@lsrr={0x83, 0x3}]}}}}}) 13:01:18 executing program 3: keyctl$get_keyring_id(0x0, 0x0, 0x0) 13:01:18 executing program 2: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r2 = memfd_secret(0x0) ftruncate(r2, 0x5) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r1, &(0x7f00000001c0)=@IORING_OP_MSG_RING={0x28, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x38, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x38}}, 0x0) 13:01:18 executing program 3: keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 96.614492][ T27] audit: type=1400 audit(1702040478.859:368): avc: denied { override_creds } for pid=6395 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 96.618306][ T6399] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 96.655091][ T6404] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 13:01:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @loopback, {[@lsrr={0x83, 0x3}]}}}}}) 13:01:19 executing program 5: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @loopback, {[@lsrr={0x83, 0x3}]}}}}}) 13:01:19 executing program 2: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r2 = memfd_secret(0x0) ftruncate(r2, 0x5) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r1, &(0x7f00000001c0)=@IORING_OP_MSG_RING={0x28, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:19 executing program 3: clock_gettime(0x0, 0x0) 13:01:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x38, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x38}}, 0x0) 13:01:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001240), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000364007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000080000000000b0000000800010075333200200002"], 0x4c}}, 0x0) [ 96.712893][ T6413] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 96.727947][ T6399] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:01:19 executing program 3: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @loopback, {[@lsrr={0x83, 0x3}]}}}}}) 13:01:19 executing program 2: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r2 = memfd_secret(0x0) ftruncate(r2, 0x5) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r1, &(0x7f00000001c0)=@IORING_OP_MSG_RING={0x28, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 13:01:19 executing program 0: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) [ 96.766467][ T6423] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 96.803495][ T6424] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 13:01:19 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r2}, 0x18) [ 96.853248][ T6437] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 96.874643][ T27] audit: type=1400 audit(1702040479.119:369): avc: denied { bind } for pid=6440 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.924822][ T27] audit: type=1400 audit(1702040479.149:370): avc: denied { create } for pid=6438 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.944551][ T27] audit: type=1400 audit(1702040479.149:371): avc: denied { ioctl } for pid=6438 comm="syz-executor.2" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14252 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 13:01:19 executing program 5: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 3: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r2}, 0x18) 13:01:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001240), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000364007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000080000000000b0000000800010075333200200002"], 0x4c}}, 0x0) 13:01:19 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) [ 96.970871][ T27] audit: type=1400 audit(1702040479.149:372): avc: denied { create } for pid=6438 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 96.994876][ T6445] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 13:01:19 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r2}, 0x18) 13:01:19 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r2}, 0x18) 13:01:19 executing program 4: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 0: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) [ 97.018872][ T6445] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 13:01:19 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 1: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 4: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 5: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 3: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:19 executing program 1: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 4: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:19 executing program 1: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:20 executing program 0: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000082000/0x9000)=nil, 0x9000, 0x0) 13:01:20 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="c0e51bf79c7f31de7c660100955141e9050000fdf98b05a55b78bc26df00009c1b28c2ed9bc52c6e608912739ca3cb50351cf2f012b6678e32467d6514035fc4f2721f1a4cc1e46e6e6784ffd288613386f63b562e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:01:20 executing program 1: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:20 executing program 5: r0 = openat$nci(0xffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x541b, 0x0) 13:01:20 executing program 2: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:20 executing program 5: r0 = openat$nci(0xffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x541b, 0x0) 13:01:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000001000000000000000003640000008e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 13:01:20 executing program 1: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:20 executing program 3: setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) 13:01:20 executing program 5: r0 = openat$nci(0xffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x541b, 0x0) 13:01:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000001000000000000000003640000008e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 13:01:20 executing program 3: setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) 13:01:21 executing program 1: r0 = io_uring_setup(0x30d3, &(0x7f0000000000)={0x0, 0x4}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10100, 0x89) r2 = inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)={0x0, 0x26}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x3}}, 0xe8) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r4 = memfd_secret(0x0) bind$inet(r4, &(0x7f00000016c0)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r0, 0xffffffffffffffff, r0], 0x3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000030c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000034c0)={r5, 0x8000, 0x1, [0x6, 0x0, 0x8, 0x0, 0x40], [0x0, 0xffffffff, 0x3, 0x6, 0x5, 0x0, 0x80000001, 0x28d7, 0x80, 0x0, 0x775, 0x446, 0x6, 0x1, 0xfffffffffffffffc, 0x7fffffff, 0x7a78, 0x0, 0x27, 0x6, 0x0, 0x6, 0x101, 0x2, 0xff, 0x0, 0x0, 0xa, 0x2, 0x0, 0x2, 0x0, 0x43d6, 0xffff, 0x0, 0x7fffffffffffffff, 0xd304, 0x0, 0x4, 0x1, 0x1, 0x100, 0x0, 0x7f, 0x0, 0x8001, 0x9, 0x100000000000, 0x4, 0x2, 0x0, 0x0, 0x8, 0x0, 0x20, 0x8, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x9, 0x0, 0x3, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4aa1, 0x0, 0x0, 0x2, 0x6, 0x1f, 0x0, 0x80000001, 0xad5, 0x6, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x73, 0x2, 0x8, 0xf24b, 0x400, 0x3508, 0x1, 0x3, 0x1000, 0x100, 0xb2, 0x0, 0x8000, 0x7, 0x0, 0x0, 0x5, 0x5, 0x1, 0x4]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000700)={{}, 0x0, 0x0, @unused=[0x2, 0xd7cd, 0x1, 0x20], @devid=r6}) close_range(r0, 0xffffffffffffffff, 0x0) 13:01:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000001000000000000000003640000008e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 13:01:21 executing program 5: r0 = openat$nci(0xffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x541b, 0x0) 13:01:21 executing program 3: setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) 13:01:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) 13:01:21 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="c0e51bf79c7f31de7c660100955141e9050000fdf98b05a55b78bc26df00009c1b28c2ed9bc52c6e608912739ca3cb50351cf2f012b6678e32467d6514035fc4f2721f1a4cc1e46e6e6784ffd288613386f63b562e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:01:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000001000000000000000003640000008e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 13:01:21 executing program 3: setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) 13:01:21 executing program 5: r0 = socket(0x29, 0x5, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 13:01:21 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8000008, 0x3, 0x258, 0x0, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'veth0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x1b, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "ecb533b898a2a50ef3160d5d381c37a6edcb01aef0ff61de46f4b3563063"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) [ 98.873501][ T6533] loop0: detected capacity change from 0 to 512 [ 98.900339][ T6533] EXT4-fs: Ignoring removed nobh option 13:01:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SEED={0x8, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 13:01:21 executing program 3: r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000900)=""/210) 13:01:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SEED={0x8, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 13:01:21 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8000008, 0x3, 0x258, 0x0, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'veth0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x1b, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "ecb533b898a2a50ef3160d5d381c37a6edcb01aef0ff61de46f4b3563063"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) 13:01:21 executing program 5: r0 = socket(0x29, 0x5, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 13:01:21 executing program 3: r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000900)=""/210) [ 98.911041][ T27] audit: type=1400 audit(1702040481.159:373): avc: denied { read } for pid=6545 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.952324][ T6533] EXT4-fs (loop0): 1 truncate cleaned up [ 98.958064][ T6533] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 13:01:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) [ 99.016528][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 99.045595][ T6565] loop0: detected capacity change from 0 to 512 [ 99.053014][ T6565] EXT4-fs: Ignoring removed nobh option [ 99.060310][ T6565] EXT4-fs (loop0): 1 truncate cleaned up [ 99.065980][ T6565] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 99.087047][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:01:21 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="c0e51bf79c7f31de7c660100955141e9050000fdf98b05a55b78bc26df00009c1b28c2ed9bc52c6e608912739ca3cb50351cf2f012b6678e32467d6514035fc4f2721f1a4cc1e46e6e6784ffd288613386f63b562e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:01:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SEED={0x8, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 13:01:21 executing program 5: r0 = socket(0x29, 0x5, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 13:01:21 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8000008, 0x3, 0x258, 0x0, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'veth0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x1b, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "ecb533b898a2a50ef3160d5d381c37a6edcb01aef0ff61de46f4b3563063"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) 13:01:21 executing program 3: r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000900)=""/210) 13:01:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) 13:01:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SEED={0x8, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 13:01:22 executing program 5: r0 = socket(0x29, 0x5, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 13:01:22 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8000008, 0x3, 0x258, 0x0, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'veth0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x1b, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "ecb533b898a2a50ef3160d5d381c37a6edcb01aef0ff61de46f4b3563063"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) 13:01:22 executing program 3: r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000900)=""/210) 13:01:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) [ 99.733824][ T6569] loop0: detected capacity change from 0 to 512 [ 99.749440][ T6569] EXT4-fs: Ignoring removed nobh option 13:01:22 executing program 2: ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x8, 'sit0\x00', {'macvtap0\x00'}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) [ 99.794634][ T6569] EXT4-fs (loop0): 1 truncate cleaned up [ 99.800421][ T6569] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 99.824030][ T6591] loop5: detected capacity change from 0 to 512 [ 99.832775][ T6591] EXT4-fs: Ignoring removed nobh option [ 99.853625][ T6591] EXT4-fs (loop5): 1 truncate cleaned up [ 99.859330][ T6591] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 99.883671][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 99.898971][ T3103] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:01:22 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="c0e51bf79c7f31de7c660100955141e9050000fdf98b05a55b78bc26df00009c1b28c2ed9bc52c6e608912739ca3cb50351cf2f012b6678e32467d6514035fc4f2721f1a4cc1e46e6e6784ffd288613386f63b562e"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:01:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003e40)=@bloom_filter={0x1e, 0x0, 0x7d8, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x7, 0xf, &(0x7f0000000280)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x58}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0xe9, &(0x7f0000000080)=""/233}, 0x90) 13:01:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) 13:01:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) 13:01:22 executing program 2: ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x8, 'sit0\x00', {'macvtap0\x00'}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 13:01:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) 13:01:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003e40)=@bloom_filter={0x1e, 0x0, 0x7d8, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x7, 0xf, &(0x7f0000000280)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x58}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0xe9, &(0x7f0000000080)=""/233}, 0x90) 13:01:22 executing program 2: ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x8, 'sit0\x00', {'macvtap0\x00'}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 13:01:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) [ 100.604192][ T6603] loop0: detected capacity change from 0 to 512 [ 100.622704][ T6603] EXT4-fs: Ignoring removed nobh option [ 100.631486][ T6603] EXT4-fs (loop0): 1 truncate cleaned up [ 100.637407][ T6603] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 13:01:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001300290a000000000000000007000000", @ANYRES32=r1, @ANYBLOB="00000000000000001c001a8018000480140004800800010000000000080002"], 0x3c}}, 0x0) 13:01:22 executing program 2: ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x8, 'sit0\x00', {'macvtap0\x00'}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 13:01:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) [ 100.655844][ T6604] loop5: detected capacity change from 0 to 512 [ 100.677919][ T3087] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 100.694886][ T6604] EXT4-fs: Ignoring removed nobh option [ 100.709472][ T6604] EXT4-fs (loop5): 1 truncate cleaned up [ 100.715189][ T6604] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 100.766637][ T3103] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:01:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB], 0xe) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xc, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1e00, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x3}, 0x48) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001100)={0xffffffffffffffff, 0x50, 0x10}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001140)={0xffffffffffffffff, 0x10001, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x58, &(0x7f0000000680)}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x8, 0x0, &(0x7f0000000b80)='GPL\x00', 0x8, 0xa4, &(0x7f0000000bc0)=""/164, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000fc0)={0x1, 0x5, 0x200, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001180)=[r1, r2, 0xffffffffffffffff, 0x1, r3, r4, 0xffffffffffffffff], 0x0, 0x10, 0x3e20742d}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(r0, &(0x7f0000000600)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8010, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x9, 0x2, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x20000000}], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x0, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000009c0)=[{0x1, 0x3}]}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x8, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x17ff3}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x5, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a000000}, [], {0x95, 0x0, 0xc00}}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0xd, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) r7 = gettid() perf_event_open(&(0x7f0000000ac0)={0x2, 0x80, 0x0, 0x0, 0x3f, 0x7, 0x0, 0x96f, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x6}, 0x1, 0x0, 0x0, 0x8, 0x9, 0x2, 0xffc0, 0x0, 0x3000}, r7, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 13:01:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x5e}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) 13:01:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001300290a000000000000000007000000", @ANYRES32=r1, @ANYBLOB="00000000000000001c001a8018000480140004800800010000000000080002"], 0x3c}}, 0x0) 13:01:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@nobarrier}, {@jqfmt_vfsold}, {@nobh}, {}, {@noinit_itable}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_abort}, {}, {@noquota}]}, 0xff, 0x47c, &(0x7f0000000640)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) 13:01:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003e40)=@bloom_filter={0x1e, 0x0, 0x7d8, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x7, 0xf, &(0x7f0000000280)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x58}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0xe9, &(0x7f0000000080)=""/233}, 0x90) 13:01:23 executing program 4: ioperm(0x0, 0x80, 0x3) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x30000) 13:01:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, 0x12, 0x909, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x4002c]}}}, 0x4c}}, 0x0) 13:01:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001300290a000000000000000007000000", @ANYRES32=r1, @ANYBLOB="00000000000000001c001a8018000480140004800800010000000000080002"], 0x3c}}, 0x0) 13:01:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003e40)=@bloom_filter={0x1e, 0x0, 0x7d8, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x7, 0xf, &(0x7f0000000280)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x58}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0xe9, &(0x7f0000000080)=""/233}, 0x90) 13:01:23 executing program 4: ioperm(0x0, 0x80, 0x3) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x30000) 13:01:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB], 0xe) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xc, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1e00, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x3}, 0x48) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001100)={0xffffffffffffffff, 0x50, 0x10}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001140)={0xffffffffffffffff, 0x10001, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x58, &(0x7f0000000680)}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x8, 0x0, &(0x7f0000000b80)='GPL\x00', 0x8, 0xa4, &(0x7f0000000bc0)=""/164, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000fc0)={0x1, 0x5, 0x200, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001180)=[r1, r2, 0xffffffffffffffff, 0x1, r3, r4, 0xffffffffffffffff], 0x0, 0x10, 0x3e20742d}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(r0, &(0x7f0000000600)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8010, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x9, 0x2, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x20000000}], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x0, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000009c0)=[{0x1, 0x3}]}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x8, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x17ff3}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0