0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 499.925331][T22421] loop1: detected capacity change from 0 to 128 06:15:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a4", 0x45}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2010014, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee", @ANYRES8], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000003dc0)=[{{&(0x7f0000000240)=@tipc=@id, 0x80, &(0x7f0000000940)=[{&(0x7f0000000480)=""/165, 0xa5}, {&(0x7f0000000540)=""/130, 0x82}, {&(0x7f0000000300)=""/101, 0x65}, {&(0x7f0000000600)=""/46, 0x2e}], 0x4, &(0x7f0000000980)=""/221, 0xdd}, 0x8}, {{&(0x7f0000000a80)=@ieee802154, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b00)=""/199, 0xc7}, {&(0x7f0000000c00)=""/153, 0x99}, {&(0x7f0000000cc0)=""/191, 0xbf}, {&(0x7f0000000d80)=""/60, 0x3c}, {&(0x7f0000000dc0)=""/63, 0x3f}], 0x5, &(0x7f0000000e80)=""/240, 0xf0}, 0x80000001}, {{&(0x7f0000000f80)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001000)=""/86, 0x56}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/84, 0x54}, 0x5}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/177, 0xb1}, {&(0x7f0000002380)=""/239, 0xef}], 0x2, &(0x7f00000024c0)=""/37, 0x25}, 0x7}, {{&(0x7f0000002500)=@tipc=@name, 0x80, &(0x7f0000002880)=[{&(0x7f0000002580)=""/56, 0x38}, {&(0x7f00000025c0)=""/219, 0xdb}, {&(0x7f00000026c0)=""/155, 0x9b}, {&(0x7f0000002780)=""/250, 0xfa}], 0x4, &(0x7f00000028c0)=""/39, 0x27}, 0x10000}, {{&(0x7f0000002900)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002980)=""/48, 0x30}], 0x1, &(0x7f0000002a00)=""/33, 0x21}, 0x200}, {{&(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002ac0)=""/126, 0x7e}, {&(0x7f0000002b40)=""/190, 0xbe}, {&(0x7f0000002c00)=""/119, 0x77}, {&(0x7f0000002c80)=""/88, 0x58}, {&(0x7f0000002d00)=""/4096, 0x1000}], 0x5, &(0x7f0000003d80)=""/59, 0x3b}, 0x562cd43d}], 0x7, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088", 0x51}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:44 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4, 0x5}}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) [ 500.106936][T22426] loop3: detected capacity change from 0 to 128 [ 500.129676][T22426] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088", 0x51}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088", 0x51}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4, 0x5}}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99", 0x57}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 500.602250][T22440] loop4: detected capacity change from 0 to 128 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99", 0x57}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99", 0x57}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xfffffffb, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:45 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) [ 500.859755][T22453] loop1: detected capacity change from 0 to 128 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96", 0x5a}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2010014, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee", @ANYRES8], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r4, &(0x7f0000003dc0)=[{{&(0x7f0000000240)=@tipc=@id, 0x80, &(0x7f0000000940)=[{&(0x7f0000000480)=""/165, 0xa5}, {&(0x7f0000000540)=""/130, 0x82}, {&(0x7f0000000300)=""/101, 0x65}, {&(0x7f0000000600)=""/46, 0x2e}], 0x4, &(0x7f0000000980)=""/221, 0xdd}, 0x8}, {{&(0x7f0000000a80)=@ieee802154, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b00)=""/199, 0xc7}, {&(0x7f0000000c00)=""/153, 0x99}, {&(0x7f0000000cc0)=""/191, 0xbf}, {&(0x7f0000000d80)=""/60, 0x3c}, {&(0x7f0000000dc0)=""/63, 0x3f}], 0x5, &(0x7f0000000e80)=""/240, 0xf0}, 0x80000001}, {{&(0x7f0000000f80)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001000)=""/86, 0x56}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/84, 0x54}, 0x5}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/177, 0xb1}, {&(0x7f0000002380)=""/239, 0xef}], 0x2, &(0x7f00000024c0)=""/37, 0x25}, 0x7}, {{&(0x7f0000002500)=@tipc=@name, 0x80, &(0x7f0000002880)=[{&(0x7f0000002580)=""/56, 0x38}, {&(0x7f00000025c0)=""/219, 0xdb}, {&(0x7f00000026c0)=""/155, 0x9b}, {&(0x7f0000002780)=""/250, 0xfa}], 0x4, &(0x7f00000028c0)=""/39, 0x27}, 0x10000}, {{&(0x7f0000002900)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002980)=""/48, 0x30}], 0x1, &(0x7f0000002a00)=""/33, 0x21}, 0x200}, {{&(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002ac0)=""/126, 0x7e}, {&(0x7f0000002b40)=""/190, 0xbe}, {&(0x7f0000002c00)=""/119, 0x77}, {&(0x7f0000002c80)=""/88, 0x58}, {&(0x7f0000002d00)=""/4096, 0x1000}], 0x5, &(0x7f0000003d80)=""/59, 0x3b}, 0x562cd43d}], 0x7, 0x2, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 501.042818][T22459] loop3: detected capacity change from 0 to 128 06:15:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async, rerun: 32) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2010014, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee", @ANYRES8], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") (rerun: 32) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async, rerun: 64) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) (rerun: 64) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async, rerun: 32) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (rerun: 32) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) (async, rerun: 32) recvmmsg(r4, &(0x7f0000003dc0)=[{{&(0x7f0000000240)=@tipc=@id, 0x80, &(0x7f0000000940)=[{&(0x7f0000000480)=""/165, 0xa5}, {&(0x7f0000000540)=""/130, 0x82}, {&(0x7f0000000300)=""/101, 0x65}, {&(0x7f0000000600)=""/46, 0x2e}], 0x4, &(0x7f0000000980)=""/221, 0xdd}, 0x8}, {{&(0x7f0000000a80)=@ieee802154, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b00)=""/199, 0xc7}, {&(0x7f0000000c00)=""/153, 0x99}, {&(0x7f0000000cc0)=""/191, 0xbf}, {&(0x7f0000000d80)=""/60, 0x3c}, {&(0x7f0000000dc0)=""/63, 0x3f}], 0x5, &(0x7f0000000e80)=""/240, 0xf0}, 0x80000001}, {{&(0x7f0000000f80)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001000)=""/86, 0x56}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/84, 0x54}, 0x5}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/177, 0xb1}, {&(0x7f0000002380)=""/239, 0xef}], 0x2, &(0x7f00000024c0)=""/37, 0x25}, 0x7}, {{&(0x7f0000002500)=@tipc=@name, 0x80, &(0x7f0000002880)=[{&(0x7f0000002580)=""/56, 0x38}, {&(0x7f00000025c0)=""/219, 0xdb}, {&(0x7f00000026c0)=""/155, 0x9b}, {&(0x7f0000002780)=""/250, 0xfa}], 0x4, &(0x7f00000028c0)=""/39, 0x27}, 0x10000}, {{&(0x7f0000002900)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002980)=""/48, 0x30}], 0x1, &(0x7f0000002a00)=""/33, 0x21}, 0x200}, {{&(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002ac0)=""/126, 0x7e}, {&(0x7f0000002b40)=""/190, 0xbe}, {&(0x7f0000002c00)=""/119, 0x77}, {&(0x7f0000002c80)=""/88, 0x58}, {&(0x7f0000002d00)=""/4096, 0x1000}], 0x5, &(0x7f0000003d80)=""/59, 0x3b}, 0x562cd43d}], 0x7, 0x2, 0x0) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96", 0x5a}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffdf2) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x8c) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96", 0x5a}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 501.188814][T22470] loop3: detected capacity change from 0 to 128 [ 501.226362][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:45 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async, rerun: 32) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async, rerun: 32) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) [ 501.268567][T22470] loop3: detected capacity change from 0 to 128 [ 501.308411][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96ca", 0x5b}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 501.404216][T22470] loop3: detected capacity change from 0 to 128 [ 501.447380][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value [ 501.482476][T22470] loop3: detected capacity change from 0 to 128 [ 501.505701][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96ca", 0x5b}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 501.546792][T22470] loop3: detected capacity change from 0 to 128 [ 501.584232][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96ca", 0x5b}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) [ 501.671670][T22470] loop3: detected capacity change from 0 to 128 [ 501.686711][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value [ 501.710730][T22470] loop3: detected capacity change from 0 to 128 [ 501.744822][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x6, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 501.790245][T22470] loop3: detected capacity change from 0 to 128 [ 501.813505][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x80000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) [ 501.875298][T22470] loop3: detected capacity change from 0 to 128 [ 501.893740][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x6, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 501.948754][T22518] loop1: detected capacity change from 0 to 128 [ 501.985020][ T3114] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 501.991778][T22521] loop4: detected capacity change from 0 to 128 [ 502.014574][T22470] loop3: detected capacity change from 0 to 128 [ 502.027410][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x3, 0x81, 0x1, 0x0, 0x2, 0x400, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x3f}, 0x0, 0x7fff, 0x0, 0x5, 0x0, 0x40, 0x48bc, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x3, r0, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x2f41e0ca, 0x101000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x100000, 0x10) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$9p_fd(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r8}, 0x0}]}}) fchownat(r3, &(0x7f00000001c0)='./file0\x00', r4, r8, 0x1000) 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x6, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 502.085304][ T3114] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 502.096298][T22470] loop3: detected capacity change from 0 to 128 [ 502.119916][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffdf2) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x8c) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 502.206562][T22470] loop3: detected capacity change from 0 to 128 [ 502.234017][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffdf2) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x8c) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 502.322188][T22470] loop3: detected capacity change from 0 to 128 [ 502.345245][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 502.370077][T22470] loop3: detected capacity change from 0 to 128 [ 502.387502][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value [ 502.459872][T22470] loop3: detected capacity change from 0 to 128 [ 502.484850][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 502.522604][T22470] loop3: detected capacity change from 0 to 128 [ 502.535077][T22470] FAT-fs (loop3): Unrecognized mount option "00000000000000000003" or missing value 06:15:47 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea7acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b711b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee0000000000000000000000000000002d2b9a5f0c5cad61a5d3b3a2721bc16e3ff0a3f79e04dd"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000580)=ANY=[]}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000340)={@dev, @remote, 0x0}, &(0x7f0000000480)=0xc) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000500)={'gre0\x00', &(0x7f00000004c0)={'syztnl1\x00', 0x0, 0x8000, 0x89, 0x2, 0x3000000, {{0x6, 0x4, 0x2, 0x4, 0x18, 0x67, 0x0, 0x7, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, {[@noop, @end]}}}}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000009c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000a80)={'syztnl1\x00', &(0x7f0000000a00)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x4, 0x0, 0x20, @remote, @mcast1, 0x8047, 0x80, 0x6, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', 0x0, 0x4, 0x80, 0xff, 0xff, 0x22, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x200000, 0x100}}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)=0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000c80)={'syztnl1\x00', &(0x7f0000000c00)={'ip6tnl0\x00', 0x0, 0x2f, 0x6, 0x0, 0xc494, 0x40, @local, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8, 0x80, 0x10001, 0x7}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xa8, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20}, 0xc0) sync_file_range(r0, 0x6, 0x29f7, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r12, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r13, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r12, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r14, &(0x7f0000000380), 0x1040c) r15 = socket(0x10, 0x803, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 502.683979][T22572] loop3: detected capacity change from 0 to 128 06:15:47 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x3, 0x81, 0x1, 0x0, 0x2, 0x400, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x3f}, 0x0, 0x7fff, 0x0, 0x5, 0x0, 0x40, 0x48bc, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x3, r0, 0xa) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x2f41e0ca, 0x101000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x1) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x100000, 0x10) (async) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) (async) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$9p_fd(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r8}, 0x0}]}}) (async) fchownat(r3, &(0x7f00000001c0)='./file0\x00', r4, r8, 0x1000) 06:15:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x800800000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 502.967596][T22586] loop1: detected capacity change from 0 to 128 06:15:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:47 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x3, 0x81, 0x1, 0x0, 0x2, 0x400, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x3f}, 0x0, 0x7fff, 0x0, 0x5, 0x0, 0x40, 0x48bc, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x3, r0, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x2f41e0ca, 0x101000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x1) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async, rerun: 32) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async, rerun: 32) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x100000, 0x10) (async, rerun: 64) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 64) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) (async) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$9p_fd(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r8}, 0x0}]}}) (async) fchownat(r3, &(0x7f00000001c0)='./file0\x00', r4, r8, 0x1000) 06:15:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:47 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x1190}, 0x1, 0x0, 0x0, 0x4c0c1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r3, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt(r3, 0x84, 0x81, &(0x7f00000002c0)='@\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x4fe5}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000b00)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000b40)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800004}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)=@ipv6_getnetconf={0x2c, 0x52, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r7}, @NETCONFA_IFINDEX={0x8, 0x1, r8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) openat$cgroup_ro(r2, &(0x7f0000000a80)='blkio.bfq.idle_time\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000a40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a00)={&(0x7f0000000380)={0x640, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r11}, {0x240, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6000000}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r9}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x9f, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r9}, {0x194, 0x2, 0x0, 0x1, [{0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x0, 0x7, 0x8, 0x9}, {0xa265, 0x7f, 0x7f, 0x7}, {0x0, 0x8, 0x9, 0xad33}, {0x7, 0x4, 0xb4, 0x63d6}, {0x7fff, 0xff, 0x1, 0x2c}, {0xfd1, 0x87, 0x7, 0xffffffff}, {0xd2, 0x60, 0x8, 0x2}, {0x8, 0x7, 0x5, 0x1}, {0xee9, 0x3f, 0x2, 0x4}, {0xf001, 0x5, 0x8, 0x8001}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x6, 0x7, 0x8001}, {0x7, 0xfe, 0x3, 0xdb5}, {0x8001, 0xff, 0xf9, 0x10000}, {0x6, 0x81, 0x1, 0x8000}, {0x9, 0x20, 0x6, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}]}}]}, 0x640}, 0x1, 0x0, 0x0, 0x4048040}, 0x4000000) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x409, 0xffffffff, 0x0, {0x0, 0x0, 0x0, r9, 0x810}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4, 0x5}}}]}, 0x34}}, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000001300)={@mcast2, r9}, 0x14) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x5000) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997", 0x18}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) (async) [ 503.347200][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 503.347215][ T27] audit: type=1400 audit(1705385747.948:432): avc: denied { name_bind } for pid=22599 comm="syz-executor.5" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 503.375475][ T27] audit: type=1400 audit(1705385747.948:433): avc: denied { node_bind } for pid=22599 comm="syz-executor.5" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 06:15:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) [ 503.498207][T22607] loop4: detected capacity change from 0 to 128 06:15:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997", 0x18}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea7acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b711b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee0000000000000000000000000000002d2b9a5f0c5cad61a5d3b3a2721bc16e3ff0a3f79e04dd"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000580)=ANY=[]}) (async) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000340)={@dev, @remote, 0x0}, &(0x7f0000000480)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000500)={'gre0\x00', &(0x7f00000004c0)={'syztnl1\x00', 0x0, 0x8000, 0x89, 0x2, 0x3000000, {{0x6, 0x4, 0x2, 0x4, 0x18, 0x67, 0x0, 0x7, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, {[@noop, @end]}}}}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000009c0)={'batadv0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000a80)={'syztnl1\x00', &(0x7f0000000a00)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x4, 0x0, 0x20, @remote, @mcast1, 0x8047, 0x80, 0x6, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', 0x0, 0x4, 0x80, 0xff, 0xff, 0x22, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x200000, 0x100}}) (async) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)=0x4) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000c80)={'syztnl1\x00', &(0x7f0000000c00)={'ip6tnl0\x00', 0x0, 0x2f, 0x6, 0x0, 0xc494, 0x40, @local, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8, 0x80, 0x10001, 0x7}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xa8, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20}, 0xc0) (async) sync_file_range(r0, 0x6, 0x29f7, 0x2) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r12, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r13, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r12, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r14, &(0x7f0000000380), 0x1040c) (async) r15 = socket(0x10, 0x803, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:48 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) (async) 06:15:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997", 0x18}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 503.625823][T22617] loop3: detected capacity change from 0 to 128 06:15:48 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x1190}, 0x1, 0x0, 0x0, 0x4c0c1}, 0x10) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (async, rerun: 32) sendto$inet6(r3, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) (async, rerun: 32) setsockopt(r3, 0x84, 0x81, &(0x7f00000002c0)='@\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x4fe5}}, './file0\x00'}) (rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000b00)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000b40)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800004}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)=@ipv6_getnetconf={0x2c, 0x52, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r7}, @NETCONFA_IFINDEX={0x8, 0x1, r8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) openat$cgroup_ro(r2, &(0x7f0000000a80)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000a40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a00)={&(0x7f0000000380)={0x640, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r11}, {0x240, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6000000}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r9}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x9f, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r9}, {0x194, 0x2, 0x0, 0x1, [{0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x0, 0x7, 0x8, 0x9}, {0xa265, 0x7f, 0x7f, 0x7}, {0x0, 0x8, 0x9, 0xad33}, {0x7, 0x4, 0xb4, 0x63d6}, {0x7fff, 0xff, 0x1, 0x2c}, {0xfd1, 0x87, 0x7, 0xffffffff}, {0xd2, 0x60, 0x8, 0x2}, {0x8, 0x7, 0x5, 0x1}, {0xee9, 0x3f, 0x2, 0x4}, {0xf001, 0x5, 0x8, 0x8001}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x6, 0x7, 0x8001}, {0x7, 0xfe, 0x3, 0xdb5}, {0x8001, 0xff, 0xf9, 0x10000}, {0x6, 0x81, 0x1, 0x8000}, {0x9, 0x20, 0x6, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}]}}]}, 0x640}, 0x1, 0x0, 0x0, 0x4048040}, 0x4000000) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x409, 0xffffffff, 0x0, {0x0, 0x0, 0x0, r9, 0x810}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4, 0x5}}}]}, 0x34}}, 0x0) (async, rerun: 32) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000001300)={@mcast2, r9}, 0x14) (async, rerun: 32) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async, rerun: 32) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x5000) (async, rerun: 32) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:48 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) (async) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x1190}, 0x1, 0x0, 0x0, 0x4c0c1}, 0x10) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) (async) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (async) sendto$inet6(r3, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) (async) setsockopt(r3, 0x84, 0x81, &(0x7f00000002c0)='@\x00\x00\x00\x00\x00\x00\x00', 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x4fe5}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000b00)={'batadv0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000b40)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800004}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)=@ipv6_getnetconf={0x2c, 0x52, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r7}, @NETCONFA_IFINDEX={0x8, 0x1, r8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) (async) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) (async) openat$cgroup_ro(r2, &(0x7f0000000a80)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) (async) getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000a40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a00)={&(0x7f0000000380)={0x640, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r11}, {0x240, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6000000}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r9}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x9f, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r9}, {0x194, 0x2, 0x0, 0x1, [{0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x0, 0x7, 0x8, 0x9}, {0xa265, 0x7f, 0x7f, 0x7}, {0x0, 0x8, 0x9, 0xad33}, {0x7, 0x4, 0xb4, 0x63d6}, {0x7fff, 0xff, 0x1, 0x2c}, {0xfd1, 0x87, 0x7, 0xffffffff}, {0xd2, 0x60, 0x8, 0x2}, {0x8, 0x7, 0x5, 0x1}, {0xee9, 0x3f, 0x2, 0x4}, {0xf001, 0x5, 0x8, 0x8001}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x6, 0x7, 0x8001}, {0x7, 0xfe, 0x3, 0xdb5}, {0x8001, 0xff, 0xf9, 0x10000}, {0x6, 0x81, 0x1, 0x8000}, {0x9, 0x20, 0x6, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}]}}]}, 0x640}, 0x1, 0x0, 0x0, 0x4048040}, 0x4000000) (async) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x409, 0xffffffff, 0x0, {0x0, 0x0, 0x0, r9, 0x810}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4, 0x5}}}]}, 0x34}}, 0x0) (async) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000001300)={@mcast2, r9}, 0x14) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x5000) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:48 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14020, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x1000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91af", 0x24}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 503.940077][T22648] loop1: detected capacity change from 0 to 128 06:15:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91af", 0x24}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91af", 0x24}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:48 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14020, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03be", 0x2a}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03be", 0x2a}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:49 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14020, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:49 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea7acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b711b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee0000000000000000000000000000002d2b9a5f0c5cad61a5d3b3a2721bc16e3ff0a3f79e04dd"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async, rerun: 64) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async, rerun: 64) r3 = getpid() (rerun: 64) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000580)=ANY=[]}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000340)={@dev, @remote, 0x0}, &(0x7f0000000480)=0xc) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000500)={'gre0\x00', &(0x7f00000004c0)={'syztnl1\x00', 0x0, 0x8000, 0x89, 0x2, 0x3000000, {{0x6, 0x4, 0x2, 0x4, 0x18, 0x67, 0x0, 0x7, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, {[@noop, @end]}}}}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000009c0)={'batadv0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000a80)={'syztnl1\x00', &(0x7f0000000a00)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x4, 0x0, 0x20, @remote, @mcast1, 0x8047, 0x80, 0x6, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000b40)={'syztnl2\x00', &(0x7f0000000ac0)={'syztnl0\x00', 0x0, 0x4, 0x80, 0xff, 0xff, 0x22, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x200000, 0x100}}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)=0x4) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000c80)={'syztnl1\x00', &(0x7f0000000c00)={'ip6tnl0\x00', 0x0, 0x2f, 0x6, 0x0, 0xc494, 0x40, @local, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8, 0x80, 0x10001, 0x7}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xa8, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20}, 0xc0) (async) sync_file_range(r0, 0x6, 0x29f7, 0x2) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r12, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r13, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r12, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r14, &(0x7f0000000380), 0x1040c) (async) r15 = socket(0x10, 0x803, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03be", 0x2a}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 504.656674][T22680] loop3: detected capacity change from 0 to 128 06:15:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb26", 0x2d}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 32) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (rerun: 32) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) (async, rerun: 64) pipe2$watch_queue(0x0, 0x80) (async, rerun: 64) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) [ 504.857421][T22686] loop4: detected capacity change from 0 to 128 06:15:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x2000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:49 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x3, 0x4, 0x36, 0x0, 0x0, 0x4, 0x320a3c72d2b627b7, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000001440)}, 0x1010, 0x3, 0x4, 0x7, 0xa3e6, 0xab, 0x3, 0x0, 0x7, 0x0, 0x6c4a}, 0xffffffffffffffff, 0x3, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000001540)={'wg2\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001800)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4001201}, 0xc, &(0x7f00000017c0)={&(0x7f0000001580)=ANY=[@ANYBLOB="240200002500000125bd7000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="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"], 0x224}}, 0x20000000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001400)={&(0x7f0000000000)=@l2, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/35, 0x23}, {&(0x7f0000000140)=""/251, 0xfb}, {&(0x7f0000000240)=""/196, 0xc4}, {&(0x7f0000000340)=""/80, 0x50}], 0x4, &(0x7f0000000400)=""/4096, 0x1000}, 0x3) perf_event_open$cgroup(&(0x7f0000001880)={0x5, 0x80, 0xff, 0x2, 0x4, 0x0, 0x0, 0xa13, 0x1820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001840), 0xf}, 0x2005, 0x4, 0x28, 0x8, 0x7fffffff, 0x2, 0x800, 0x0, 0x3, 0x0, 0x10000}, r2, 0x3, r0, 0x4) 06:15:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb26", 0x2d}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 505.137074][T22695] loop1: detected capacity change from 0 to 128 [ 505.285573][ T27] audit: type=1400 audit(1705385749.818:434): avc: denied { read } for pid=22694 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 06:15:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb26", 0x2d}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 505.583567][T22711] loop3: detected capacity change from 0 to 128 06:15:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5", 0x2f}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x3, 0x4, 0x36, 0x0, 0x0, 0x4, 0x320a3c72d2b627b7, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000001440)}, 0x1010, 0x3, 0x4, 0x7, 0xa3e6, 0xab, 0x3, 0x0, 0x7, 0x0, 0x6c4a}, 0xffffffffffffffff, 0x3, r0, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000001540)={'wg2\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001800)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4001201}, 0xc, &(0x7f00000017c0)={&(0x7f0000001580)=ANY=[@ANYBLOB="240200002500000125bd7000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="0e00ffff0d0005000d000f00640108801c0001007f100900010000000200000000040400da000000030000000a00020000000400800000001c00010004000afb9ea20000000000000000000015090000040000000c000200ff7f0001090001001c000100079104009c0000000200000007000000b06300000100000006000200010000001c0001007f03020000000000000000000900000000000004030000000a0002007f00feffc34500001c00010000007f000000806f020000005007000000080000040000000c00020005000101040007001c000100201f030002000000020000000000000074000000030000000a000200c10408003d0300001c0001007520f8ff00270000010000002b070000090000000600000010000200060063f709000900040000001c000100ebff0004040000000100000000080000810000000100000006000200090000001c000100224cff00090000000000000000000000331800000200000008000200060006009c0008801c0001004e060180010001000000000000000000d7dd0000090000001600020007000400ff00ff0001000008ff070002060000001c0001001f09ff00000001000200000004000000ff0700000a0000001800020004000400000401000fdc870f01043400a90900001c000100c436320bbf73000001000000020000000800000008000000140002000600000000fc80000034580004000900"], 0x224}}, 0x20000000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) recvmsg(r1, &(0x7f0000001400)={&(0x7f0000000000)=@l2, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/35, 0x23}, {&(0x7f0000000140)=""/251, 0xfb}, {&(0x7f0000000240)=""/196, 0xc4}, {&(0x7f0000000340)=""/80, 0x50}], 0x4, &(0x7f0000000400)=""/4096, 0x1000}, 0x3) (async) perf_event_open$cgroup(&(0x7f0000001880)={0x5, 0x80, 0xff, 0x2, 0x4, 0x0, 0x0, 0xa13, 0x1820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001840), 0xf}, 0x2005, 0x4, 0x28, 0x8, 0x7fffffff, 0x2, 0x800, 0x0, 0x3, 0x0, 0x10000}, r2, 0x3, r0, 0x4) 06:15:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5", 0x2f}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 505.980124][T22726] loop4: detected capacity change from 0 to 128 06:15:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x4000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5", 0x2f}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:50 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 506.112526][T22732] loop1: detected capacity change from 0 to 128 06:15:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x3, 0x4, 0x36, 0x0, 0x0, 0x4, 0x320a3c72d2b627b7, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000001440)}, 0x1010, 0x3, 0x4, 0x7, 0xa3e6, 0xab, 0x3, 0x0, 0x7, 0x0, 0x6c4a}, 0xffffffffffffffff, 0x3, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000001540)={'wg2\x00', 0x0}) (rerun: 64) sendmsg$nl_route_sched(r2, &(0x7f0000001800)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4001201}, 0xc, &(0x7f00000017c0)={&(0x7f0000001580)=ANY=[@ANYBLOB="240200002500000125bd7000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="0e00ffff0d0005000d000f00640108801c0001007f100900010000000200000000040400da000000030000000a00020000000400800000001c00010004000afb9ea20000000000000000000015090000040000000c000200ff7f0001090001001c000100079104009c0000000200000007000000b06300000100000006000200010000001c0001007f03020000000000000000000900000000000004030000000a0002007f00feffc34500001c00010000007f000000806f020000005007000000080000040000000c00020005000101040007001c000100201f030002000000020000000000000074000000030000000a000200c10408003d0300001c0001007520f8ff00270000010000002b070000090000000600000010000200060063f709000900040000001c000100ebff0004040000000100000000080000810000000100000006000200090000001c000100224cff00090000000000000000000000331800000200000008000200060006009c0008801c0001004e060180010001000000000000000000d7dd0000090000001600020007000400ff00ff0001000008ff070002060000001c0001001f09ff00000001000200000004000000ff0700000a0000001800020004000400000401000fdc870f01043400a90900001c000100c436320bbf73000001000000020000000800000008000000140002000600000000fc80000034580004000900"], 0x224}}, 0x20000000) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async, rerun: 32) recvmsg(r1, &(0x7f0000001400)={&(0x7f0000000000)=@l2, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/35, 0x23}, {&(0x7f0000000140)=""/251, 0xfb}, {&(0x7f0000000240)=""/196, 0xc4}, {&(0x7f0000000340)=""/80, 0x50}], 0x4, &(0x7f0000000400)=""/4096, 0x1000}, 0x3) (async, rerun: 32) perf_event_open$cgroup(&(0x7f0000001880)={0x5, 0x80, 0xff, 0x2, 0x4, 0x0, 0x0, 0xa13, 0x1820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001840), 0xf}, 0x2005, 0x4, 0x28, 0x8, 0x7fffffff, 0x2, 0x800, 0x0, 0x3, 0x0, 0x10000}, r2, 0x3, r0, 0x4) 06:15:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:50 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x40, 0x9, 0xde, 0x0, {{0x1e, 0x4, 0x0, 0x0, 0x78, 0x66, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xf}, @remote, {[@ssrr={0x89, 0x17, 0xf1, [@rand_addr=0x64010101, @remote, @remote, @local, @broadcast]}, @rr={0x7, 0xf, 0x12, [@private=0xa010102, @local, @broadcast]}, @lsrr={0x83, 0x7, 0x9a, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x34, 0xc1, 0x3, 0x3, [{@rand_addr=0x64010101}, {@broadcast, 0x80000000}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x40}, {@empty}, {@dev={0xac, 0x14, 0x14, 0x38}, 0xd657}]}]}}}}}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x12, 0x6, 0x9, 0x3, 0x44, 0xffffffffffffffff, 0x3ff, '\x00', r3, r4, 0x0, 0x5, 0x2}, 0x48) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20040010}, 0x4000010) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@version_u}, {@privport}, {@version_9p2000}], [{@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}}) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x44}}, 0x0) 06:15:51 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x40, 0x9, 0xde, 0x0, {{0x1e, 0x4, 0x0, 0x0, 0x78, 0x66, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xf}, @remote, {[@ssrr={0x89, 0x17, 0xf1, [@rand_addr=0x64010101, @remote, @remote, @local, @broadcast]}, @rr={0x7, 0xf, 0x12, [@private=0xa010102, @local, @broadcast]}, @lsrr={0x83, 0x7, 0x9a, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x34, 0xc1, 0x3, 0x3, [{@rand_addr=0x64010101}, {@broadcast, 0x80000000}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x40}, {@empty}, {@dev={0xac, 0x14, 0x14, 0x38}, 0xd657}]}]}}}}}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x12, 0x6, 0x9, 0x3, 0x44, 0xffffffffffffffff, 0x3ff, '\x00', r3, r4, 0x0, 0x5, 0x2}, 0x48) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20040010}, 0x4000010) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@version_u}, {@privport}, {@version_9p2000}], [{@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}}) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(r1, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x40, 0x9, 0xde, 0x0, {{0x1e, 0x4, 0x0, 0x0, 0x78, 0x66, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xf}, @remote, {[@ssrr={0x89, 0x17, 0xf1, [@rand_addr=0x64010101, @remote, @remote, @local, @broadcast]}, @rr={0x7, 0xf, 0x12, [@private=0xa010102, @local, @broadcast]}, @lsrr={0x83, 0x7, 0x9a, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x34, 0xc1, 0x3, 0x3, [{@rand_addr=0x64010101}, {@broadcast, 0x80000000}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x40}, {@empty}, {@dev={0xac, 0x14, 0x14, 0x38}, 0xd657}]}]}}}}}) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x12, 0x6, 0x9, 0x3, 0x44, 0xffffffffffffffff, 0x3ff, '\x00', r3, r4, 0x0, 0x5, 0x2}, 0x48) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20040010}, 0x4000010) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@version_u}, {@privport}, {@version_9p2000}], [{@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}}) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) 06:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x44}}, 0x0) 06:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x44}}, 0x0) 06:15:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:51 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x1040c) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x6000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 507.019089][T22768] loop3: detected capacity change from 0 to 128 [ 507.048005][T22769] loop4: detected capacity change from 0 to 128 [ 507.107496][ T3114] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 507.137258][T22775] loop3: detected capacity change from 0 to 128 [ 507.141436][ T3114] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 507.152862][ T3114] Buffer I/O error on dev loop3, logical block 0, async page read [ 507.158373][T22777] loop1: detected capacity change from 0 to 128 06:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:52 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:52 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (rerun: 64) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x1040c) (async) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 508.082714][T22795] loop3: detected capacity change from 0 to 128 06:15:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:52 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) (async) 06:15:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x1040c) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:52 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x7ffffffffffff, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 508.242514][T22804] loop4: detected capacity change from 0 to 128 [ 508.269307][T22803] loop3: detected capacity change from 0 to 128 [ 508.357664][T22811] loop1: detected capacity change from 0 to 128 06:15:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:53 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x40, 0x9, 0xde, 0x0, {{0x1e, 0x4, 0x0, 0x0, 0x78, 0x66, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xf}, @remote, {[@ssrr={0x89, 0x17, 0xf1, [@rand_addr=0x64010101, @remote, @remote, @local, @broadcast]}, @rr={0x7, 0xf, 0x12, [@private=0xa010102, @local, @broadcast]}, @lsrr={0x83, 0x7, 0x9a, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x34, 0xc1, 0x3, 0x3, [{@rand_addr=0x64010101}, {@broadcast, 0x80000000}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x40}, {@empty}, {@dev={0xac, 0x14, 0x14, 0x38}, 0xd657}]}]}}}}}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x12, 0x6, 0x9, 0x3, 0x44, 0xffffffffffffffff, 0x3ff, '\x00', r3, r4, 0x0, 0x5, 0x2}, 0x48) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20040010}, 0x4000010) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@version_u}, {@privport}, {@version_9p2000}], [{@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}}) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00), 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00), 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547c45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab3696c983f216075ffc018a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f00000003c0)="e8a18d11c7f0baf80e0ae61d53be30c1b930b7eb2471c638624494b5ebe2c5bc07ac2949b6015550c41bced6bb22e8aa85d349ffed5b349c321e3ecb03d1db64004307f6a2e761f1c611e4640644810da6faaba036850eb29e12b469daa9ad44f58b30175bef804c80b2bca91a808ca1c0a40d3b73566333c2cddffcfcb15d87be57534803339769f3b2456e7b18987ef429acf6513a40aff81e758d", 0x9c}, {&(0x7f0000000000)="82220d32", 0x4}], 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f0000004700)=[{{&(0x7f0000000300)=@hci, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000480)=""/229, 0xe5}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x5, &(0x7f0000002b00)=""/83, 0x53}, 0x58a2}, {{&(0x7f0000002b80)=@qipcrtr, 0x80, &(0x7f00000031c0)=[{&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f0000002c00)=""/235, 0xeb}, {&(0x7f0000002d00)=""/195, 0xc3}, {&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/181, 0xb5}, {&(0x7f0000002f00)=""/232, 0xe8}, {&(0x7f0000003000)=""/51, 0x33}, {&(0x7f0000003040)=""/188, 0xbc}, {&(0x7f0000003100)=""/174, 0xae}], 0xa, &(0x7f0000003280)=""/107, 0x6b}, 0x6}, {{0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000003300)=""/57, 0x39}, {&(0x7f0000003340)=""/48, 0x30}, {&(0x7f0000003380)=""/25, 0x19}, {&(0x7f00000033c0)=""/242, 0xf2}, {&(0x7f00000034c0)=""/186, 0xba}, {&(0x7f0000003580)=""/237, 0xed}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x7}}], 0x3, 0x2000, 0x0) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:53 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x290040a, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}], [{@subj_role={'subj_role', 0x3d, '.'}}, {@subj_role={'subj_role', 0x3d, '{-'}}, {@obj_type={'obj_type', 0x3d, '\x8b@%\'#%:#'}}, {@euid_lt={'euid<', r4}}, {@fsname={'fsname', 0x3d, '!:-'}}]}}) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r2, 0xf505, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00), 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 509.171561][T22831] loop3: detected capacity change from 0 to 128 06:15:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:53 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 64) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (rerun: 32) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async, rerun: 64) r3 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 64) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) (async, rerun: 64) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x290040a, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}], [{@subj_role={'subj_role', 0x3d, '.'}}, {@subj_role={'subj_role', 0x3d, '{-'}}, {@obj_type={'obj_type', 0x3d, '\x8b@%\'#%:#'}}, {@euid_lt={'euid<', r4}}, {@fsname={'fsname', 0x3d, '!:-'}}]}}) (rerun: 64) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r2, 0xf505, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x8000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 509.370009][T22837] loop4: detected capacity change from 0 to 128 06:15:54 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 509.571116][T22843] loop1: detected capacity change from 0 to 128 06:15:54 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@private2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000780)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) r4 = geteuid() getgroups(0x7, &(0x7f00000007c0)=[0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0xee01]) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000008c0)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0\x00'}) r8 = syz_clone(0xe88280, 0x0, 0x6dee42, 0x0, 0x0, 0x0) ptrace(0x10, r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000000}, 0xc, &(0x7f0000000180)=[{&(0x7f0000000a00)=ANY=[@ANYBLOB="100000aa9e3c6c0227bd7000fcdbdf25f59e77cdd8aaafff56283fc3c5e75d07ea1684bada2ccfd640f4d33b4b786fa7ba4a827a315a5dee7fad5401ded6b299a979cbb6f1b142345f3331ba4ba9f327189f1fbd194cbdbaca8be970424ccbbcb1ccb012cc98951a3e910e2cbc28c58e8e5bfe89a777d49d250ef2c7b888224999d730c377ef9b10b6d81056fac866f9e70f1e785d9f5555ce4b774bb32001e54fddcac9"], 0x10}, {&(0x7f0000000280)={0x390, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x374, 0x87, 0x0, 0x1, [@generic="af4cd8438d69f8e440c3667db3decf5f7075c1cf71e317e5b25a2671f6f36e71cae3f3b2d85dbb7c8412ebb2ec24c3001a1130c941dbfab5185da4cfa34f42690ee55f5bafd6487a8918e13f6243cf9e2d741556a588345978e64e55bb3318b3ec4f20ae1a98acf95bedac50c8cb4d412e7caaa3a534c5f91d97eeb07911e40f00243875ed9664d2e6f821e56fc174e885fa784d25af05a65b35b0935982fa758f87ea3ce50e778bcadac24dca057d56eb01358320e32804ad3fa812b133e3fceb13647998b6ce6fd39c4a", @typed={0xc, 0xd, 0x0, 0x0, @u64=0x5}, @generic="e9e2a444aad878412785a6d9370ade55bc146b5bfdc0c43d40e4b94ab4098d28d5ff2405373f71b396a5d178c725c1f5fd27432ccf202f148c482b4f27c5d3712a0be6aa8659067927ccbb91ac938d7da7e886911f8ebd509b445326ee9d6bdcc51164d183ec846a168e97bca250eb8f273237376d67108d77ebb783e4fd5d5034e95fea8ebc79046a2538071464d15cbf6eb5245e69b0e616cb3bd300c7f613a475d8c4835ba3", @typed={0xe2, 0x20, 0x0, 0x0, @binary="b8df6a5cd3765788675a46e5baf5d68db9404c59396ad752aa73466a99b63d2756cb47d1c07ef96c9c0e05bcd569549cd9e816c8cec4cdf02cc1be659d25d01487880abaf0b530f4916fb4f7fee77870e2fd762183adb4c770cae96d6f890b794bc3694ab938b5c3981515128cb0b33176a524670eda48c6ae85d28243d5c316b7209fbc4055149b6a54e86b56e7241ae371f9e4e8899cfd83e85b910546c19001dc7573bcd607715289b3bbdc49dbb2a12547cd638ac4ecf6fa456eb200b98afa9a33b9835a9708fa4cd7d3a7d3f2e1840fb0f47a865b2c7be962b03b20"}, @typed={0x8, 0x57, 0x0, 0x0, @ipv4=@empty}, @typed={0x8, 0x35, 0x0, 0x0, @u32=0x4}, @typed={0x4, 0x85}, @typed={0x8, 0x61, 0x0, 0x0, @fd=r0}, @generic="e26ec35039f9c8019db2692976777a616a6d78555a485fcd8722aa8318848bbbfc94beea871a7137768134d139c0fef851558716edb35424b972cffe6a5a4a9cd189530ffd205e42ef69ff9b0135004e5931c37f9e5a63df170a079f33ac29454b37dff605569784b626d2af2a1b9a37730ec4e838b5f25e7d5c460bdc979be079ad62e0a101ca027be8eb053ada55b79b417ce0a95d670878f1b437af62ea850d48440ea100886e44b125bfc13a0be64f282c10cf1f0dccd0cf171eb1a43fc580c2b2ab5341bdd3db46073ee02eb1d75529d6e28526bb0302ad51c15826d561dd52f5b93fea298f792c3b7614d67ab8b30d"]}, @typed={0xc, 0x5d, 0x0, 0x0, @u64=0x8001}]}, 0x390}], 0x2, &(0x7f0000000900)=[@rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}], 0xa0, 0x20040014}, 0x80) r12 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:54 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x290040a, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}], [{@subj_role={'subj_role', 0x3d, '.'}}, {@subj_role={'subj_role', 0x3d, '{-'}}, {@obj_type={'obj_type', 0x3d, '\x8b@%\'#%:#'}}, {@euid_lt={'euid<', r4}}, {@fsname={'fsname', 0x3d, '!:-'}}]}}) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r2, 0xf505, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) (async) setuid(r4) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x290040a, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}], [{@subj_role={'subj_role', 0x3d, '.'}}, {@subj_role={'subj_role', 0x3d, '{-'}}, {@obj_type={'obj_type', 0x3d, '\x8b@%\'#%:#'}}, {@euid_lt={'euid<', r4}}, {@fsname={'fsname', 0x3d, '!:-'}}]}}) (async) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r2, 0xf505, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) 06:15:54 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x40000000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x48190, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) getdents(r1, &(0x7f0000000040)=""/94, 0x5e) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 06:15:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) (async) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@private2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000780)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) (async, rerun: 64) r4 = geteuid() (rerun: 64) getgroups(0x7, &(0x7f00000007c0)=[0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0xee01]) (async) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000008c0)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0\x00'}) r8 = syz_clone(0xe88280, 0x0, 0x6dee42, 0x0, 0x0, 0x0) ptrace(0x10, r8) (async) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000000}, 0xc, &(0x7f0000000180)=[{&(0x7f0000000a00)=ANY=[@ANYBLOB="100000aa9e3c6c0227bd7000fcdbdf25f59e77cdd8aaafff56283fc3c5e75d07ea1684bada2ccfd640f4d33b4b786fa7ba4a827a315a5dee7fad5401ded6b299a979cbb6f1b142345f3331ba4ba9f327189f1fbd194cbdbaca8be970424ccbbcb1ccb012cc98951a3e910e2cbc28c58e8e5bfe89a777d49d250ef2c7b888224999d730c377ef9b10b6d81056fac866f9e70f1e785d9f5555ce4b774bb32001e54fddcac9"], 0x10}, {&(0x7f0000000280)={0x390, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x374, 0x87, 0x0, 0x1, [@generic="af4cd8438d69f8e440c3667db3decf5f7075c1cf71e317e5b25a2671f6f36e71cae3f3b2d85dbb7c8412ebb2ec24c3001a1130c941dbfab5185da4cfa34f42690ee55f5bafd6487a8918e13f6243cf9e2d741556a588345978e64e55bb3318b3ec4f20ae1a98acf95bedac50c8cb4d412e7caaa3a534c5f91d97eeb07911e40f00243875ed9664d2e6f821e56fc174e885fa784d25af05a65b35b0935982fa758f87ea3ce50e778bcadac24dca057d56eb01358320e32804ad3fa812b133e3fceb13647998b6ce6fd39c4a", @typed={0xc, 0xd, 0x0, 0x0, @u64=0x5}, @generic="e9e2a444aad878412785a6d9370ade55bc146b5bfdc0c43d40e4b94ab4098d28d5ff2405373f71b396a5d178c725c1f5fd27432ccf202f148c482b4f27c5d3712a0be6aa8659067927ccbb91ac938d7da7e886911f8ebd509b445326ee9d6bdcc51164d183ec846a168e97bca250eb8f273237376d67108d77ebb783e4fd5d5034e95fea8ebc79046a2538071464d15cbf6eb5245e69b0e616cb3bd300c7f613a475d8c4835ba3", @typed={0xe2, 0x20, 0x0, 0x0, @binary="b8df6a5cd3765788675a46e5baf5d68db9404c59396ad752aa73466a99b63d2756cb47d1c07ef96c9c0e05bcd569549cd9e816c8cec4cdf02cc1be659d25d01487880abaf0b530f4916fb4f7fee77870e2fd762183adb4c770cae96d6f890b794bc3694ab938b5c3981515128cb0b33176a524670eda48c6ae85d28243d5c316b7209fbc4055149b6a54e86b56e7241ae371f9e4e8899cfd83e85b910546c19001dc7573bcd607715289b3bbdc49dbb2a12547cd638ac4ecf6fa456eb200b98afa9a33b9835a9708fa4cd7d3a7d3f2e1840fb0f47a865b2c7be962b03b20"}, @typed={0x8, 0x57, 0x0, 0x0, @ipv4=@empty}, @typed={0x8, 0x35, 0x0, 0x0, @u32=0x4}, @typed={0x4, 0x85}, @typed={0x8, 0x61, 0x0, 0x0, @fd=r0}, @generic="e26ec35039f9c8019db2692976777a616a6d78555a485fcd8722aa8318848bbbfc94beea871a7137768134d139c0fef851558716edb35424b972cffe6a5a4a9cd189530ffd205e42ef69ff9b0135004e5931c37f9e5a63df170a079f33ac29454b37dff605569784b626d2af2a1b9a37730ec4e838b5f25e7d5c460bdc979be079ad62e0a101ca027be8eb053ada55b79b417ce0a95d670878f1b437af62ea850d48440ea100886e44b125bfc13a0be64f282c10cf1f0dccd0cf171eb1a43fc580c2b2ab5341bdd3db46073ee02eb1d75529d6e28526bb0302ad51c15826d561dd52f5b93fea298f792c3b7614d67ab8b30d"]}, @typed={0xc, 0x5d, 0x0, 0x0, @u64=0x8001}]}, 0x390}], 0x2, &(0x7f0000000900)=[@rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}], 0xa0, 0x20040014}, 0x80) r12 = socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 64) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) setsockopt$IPT_SO_SET_REPLACE(r12, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:54 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) (async) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@private2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000780)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) (async) r4 = geteuid() (async) getgroups(0x7, &(0x7f00000007c0)=[0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0xee01]) (async) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000008c0)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0\x00'}) r8 = syz_clone(0xe88280, 0x0, 0x6dee42, 0x0, 0x0, 0x0) ptrace(0x10, r8) (async) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000000}, 0xc, &(0x7f0000000180)=[{&(0x7f0000000a00)=ANY=[@ANYBLOB="100000aa9e3c6c0227bd7000fcdbdf25f59e77cdd8aaafff56283fc3c5e75d07ea1684bada2ccfd640f4d33b4b786fa7ba4a827a315a5dee7fad5401ded6b299a979cbb6f1b142345f3331ba4ba9f327189f1fbd194cbdbaca8be970424ccbbcb1ccb012cc98951a3e910e2cbc28c58e8e5bfe89a777d49d250ef2c7b888224999d730c377ef9b10b6d81056fac866f9e70f1e785d9f5555ce4b774bb32001e54fddcac9"], 0x10}, {&(0x7f0000000280)={0x390, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x374, 0x87, 0x0, 0x1, [@generic="af4cd8438d69f8e440c3667db3decf5f7075c1cf71e317e5b25a2671f6f36e71cae3f3b2d85dbb7c8412ebb2ec24c3001a1130c941dbfab5185da4cfa34f42690ee55f5bafd6487a8918e13f6243cf9e2d741556a588345978e64e55bb3318b3ec4f20ae1a98acf95bedac50c8cb4d412e7caaa3a534c5f91d97eeb07911e40f00243875ed9664d2e6f821e56fc174e885fa784d25af05a65b35b0935982fa758f87ea3ce50e778bcadac24dca057d56eb01358320e32804ad3fa812b133e3fceb13647998b6ce6fd39c4a", @typed={0xc, 0xd, 0x0, 0x0, @u64=0x5}, @generic="e9e2a444aad878412785a6d9370ade55bc146b5bfdc0c43d40e4b94ab4098d28d5ff2405373f71b396a5d178c725c1f5fd27432ccf202f148c482b4f27c5d3712a0be6aa8659067927ccbb91ac938d7da7e886911f8ebd509b445326ee9d6bdcc51164d183ec846a168e97bca250eb8f273237376d67108d77ebb783e4fd5d5034e95fea8ebc79046a2538071464d15cbf6eb5245e69b0e616cb3bd300c7f613a475d8c4835ba3", @typed={0xe2, 0x20, 0x0, 0x0, @binary="b8df6a5cd3765788675a46e5baf5d68db9404c59396ad752aa73466a99b63d2756cb47d1c07ef96c9c0e05bcd569549cd9e816c8cec4cdf02cc1be659d25d01487880abaf0b530f4916fb4f7fee77870e2fd762183adb4c770cae96d6f890b794bc3694ab938b5c3981515128cb0b33176a524670eda48c6ae85d28243d5c316b7209fbc4055149b6a54e86b56e7241ae371f9e4e8899cfd83e85b910546c19001dc7573bcd607715289b3bbdc49dbb2a12547cd638ac4ecf6fa456eb200b98afa9a33b9835a9708fa4cd7d3a7d3f2e1840fb0f47a865b2c7be962b03b20"}, @typed={0x8, 0x57, 0x0, 0x0, @ipv4=@empty}, @typed={0x8, 0x35, 0x0, 0x0, @u32=0x4}, @typed={0x4, 0x85}, @typed={0x8, 0x61, 0x0, 0x0, @fd=r0}, @generic="e26ec35039f9c8019db2692976777a616a6d78555a485fcd8722aa8318848bbbfc94beea871a7137768134d139c0fef851558716edb35424b972cffe6a5a4a9cd189530ffd205e42ef69ff9b0135004e5931c37f9e5a63df170a079f33ac29454b37dff605569784b626d2af2a1b9a37730ec4e838b5f25e7d5c460bdc979be079ad62e0a101ca027be8eb053ada55b79b417ce0a95d670878f1b437af62ea850d48440ea100886e44b125bfc13a0be64f282c10cf1f0dccd0cf171eb1a43fc580c2b2ab5341bdd3db46073ee02eb1d75529d6e28526bb0302ad51c15826d561dd52f5b93fea298f792c3b7614d67ab8b30d"]}, @typed={0xc, 0x5d, 0x0, 0x0, @u64=0x8001}]}, 0x390}], 0x2, &(0x7f0000000900)=[@rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}], 0xa0, 0x20040014}, 0x80) (async) r12 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r12, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547c45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab3696c983f216075ffc018a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f00000003c0)="e8a18d11c7f0baf80e0ae61d53be30c1b930b7eb2471c638624494b5ebe2c5bc07ac2949b6015550c41bced6bb22e8aa85d349ffed5b349c321e3ecb03d1db64004307f6a2e761f1c611e4640644810da6faaba036850eb29e12b469daa9ad44f58b30175bef804c80b2bca91a808ca1c0a40d3b73566333c2cddffcfcb15d87be57534803339769f3b2456e7b18987ef429acf6513a40aff81e758d", 0x9c}, {&(0x7f0000000000)="82220d32", 0x4}], 0x2) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) recvmmsg(r0, &(0x7f0000004700)=[{{&(0x7f0000000300)=@hci, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000480)=""/229, 0xe5}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x5, &(0x7f0000002b00)=""/83, 0x53}, 0x58a2}, {{&(0x7f0000002b80)=@qipcrtr, 0x80, &(0x7f00000031c0)=[{&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f0000002c00)=""/235, 0xeb}, {&(0x7f0000002d00)=""/195, 0xc3}, {&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/181, 0xb5}, {&(0x7f0000002f00)=""/232, 0xe8}, {&(0x7f0000003000)=""/51, 0x33}, {&(0x7f0000003040)=""/188, 0xbc}, {&(0x7f0000003100)=""/174, 0xae}], 0xa, &(0x7f0000003280)=""/107, 0x6b}, 0x6}, {{0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000003300)=""/57, 0x39}, {&(0x7f0000003340)=""/48, 0x30}, {&(0x7f0000003380)=""/25, 0x19}, {&(0x7f00000033c0)=""/242, 0xf2}, {&(0x7f00000034c0)=""/186, 0xba}, {&(0x7f0000003580)=""/237, 0xed}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x7}}], 0x3, 0x2000, 0x0) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:54 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) io_setup(0x9, &(0x7f00000004c0)=0x0) io_submit(r4, 0x6, &(0x7f0000000a00)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x7, r1, &(0x7f0000000500)="6df64206ba2bd79e4103d7bd651081835695ce012867a0303d41fd7ca5b8a4017b63e24e7fd5028f7bf86f555949a9d7682afc65c42290204d34d7fa2c8d5170c6160bb44084066140133701482d8bbd18cc5a2a457a9e88e042be4408b4e670e7d813df05044a954f7164da889a4c209aa7258265160771a4b0147f", 0x7c, 0x1, 0x0, 0x0, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x401, r3, &(0x7f00000005c0)="3dc65d7420e26c5a2c048df1628ff6c10ac3fbffe63109028962eedc5860b7a9e2485623119fcb2208e9009e467860f75c51d4829d7d579b843a0a6f309c478a1d692c8f6584d6337850af7f62ea1cf100408dfeea3a15ce1ecc6a47052af5c837713b350006f7378f50360fc0e65fe55292765e2f8da2dd6adc6fccf1c51056602baeb12fff8ea027625aa39f3f53ce5ceed731c21cd5110b97acf502f2a00fc99ffd77bebe2b1827c8d156dabb928d2db65564cb30", 0xb6, 0x5, 0x0, 0x2, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f00000006c0)="d10e89095df85b1b78b8ab6da4902077a34377609b6c0d2d137f912934d12717dd333f4037f0886e03c5d90e12f087eeb12e8d7b7c5fd093a45f2aed42f6173dd8942ab61f2e4992140a43a8e98bcc4bb584f586b101a65765f3d58750cd2d8a1cd52249a3dd085cfaf0e9603f6e59985a48bd8adac4c5980adc8b902724a4725f688934cf00723c0cb85dfe801b93995be7806e6dab4780ebe3246c93a5a415d962888c198b6eace1a3886ea7689d0bff57b8d1b86d75cba918143456ec25647005846b2409ce2404befb7fb8b0ca998b6887525e1e9589e0ae85", 0xdb, 0x9, 0x0, 0x2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x81, r0, &(0x7f0000000800)="fe9b5aaddd017d721905f2435c322a50e48c99d8f0cb70d10255440dba1cdc67650781e9a1e528400de399fae732cb1db746a17704bf704cf364cb2bbde119f6a92b045ca28fd7ad14105e29cf2a1cdd99754c6e9fae6c9ca58fc88332f2ce1a9bfcf855b1bbd65d1d7d4fb012", 0x6d, 0x80, 0x0, 0x1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f00000008c0)="36370b9f8f0782a4f68838", 0xb, 0xfffffffffffffffc, 0x0, 0x1, r2}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x4, r3, &(0x7f0000000940)="19428bdef8387d980a89647613ef676f87150a0eb203a8359586cf9603d26db148265607c415ae8b776be076ed957de175211d72258c6945bf25075146232e83fe960c3ca2aa7d37613ca1ec9fc40c3eef2809cb", 0x54, 0x10001, 0x0, 0x3, r2}]) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x2e, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x2, 0x3, 0x0, 0x8, 0x3, 0xfffffffffffffff0, 0xffffffffffffffff}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x1, 0x2, 0x4, 0x7, 0x8, 0x100, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, @alu={0x7, 0x0, 0x9, 0x6, 0x1, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffe}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x39, &(0x7f0000000040)=""/57, 0x41000, 0x0, '\x00', r5, 0x0, r2, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x8, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000340)=[r2, r2, r2, r2, r2], &(0x7f0000000380)=[{0x4, 0x2, 0x4, 0xc}, {0x0, 0x5, 0x2, 0x1}, {0x1, 0x5, 0xd, 0x6}, {0x4, 0x5, 0xc, 0x3}, {0x2, 0x3, 0x9, 0x9}, {0x5, 0x3, 0xf, 0x4}, {0x2, 0x3, 0x6, 0x2}], 0x10, 0x7}, 0x90) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:54 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 510.125925][T22879] loop3: detected capacity change from 0 to 128 06:15:55 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x40000000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x48190, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) getdents(r1, &(0x7f0000000040)=""/94, 0x5e) (async) getdents(r1, &(0x7f0000000040)=""/94, 0x5e) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 06:15:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xa000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 510.618385][T22891] loop1: detected capacity change from 0 to 128 06:15:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 510.792660][T22899] loop4: detected capacity change from 0 to 128 06:15:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x0, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:55 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x40000000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x48190, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) getdents(r1, &(0x7f0000000040)=""/94, 0x5e) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x40000000) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x48190, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) (async) getdents(r1, &(0x7f0000000040)=""/94, 0x5e) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) 06:15:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547c45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab3696c983f216075ffc018a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f00000003c0)="e8a18d11c7f0baf80e0ae61d53be30c1b930b7eb2471c638624494b5ebe2c5bc07ac2949b6015550c41bced6bb22e8aa85d349ffed5b349c321e3ecb03d1db64004307f6a2e761f1c611e4640644810da6faaba036850eb29e12b469daa9ad44f58b30175bef804c80b2bca91a808ca1c0a40d3b73566333c2cddffcfcb15d87be57534803339769f3b2456e7b18987ef429acf6513a40aff81e758d", 0x9c}, {&(0x7f0000000000)="82220d32", 0x4}], 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f0000004700)=[{{&(0x7f0000000300)=@hci, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000480)=""/229, 0xe5}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x5, &(0x7f0000002b00)=""/83, 0x53}, 0x58a2}, {{&(0x7f0000002b80)=@qipcrtr, 0x80, &(0x7f00000031c0)=[{&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f0000002c00)=""/235, 0xeb}, {&(0x7f0000002d00)=""/195, 0xc3}, {&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/181, 0xb5}, {&(0x7f0000002f00)=""/232, 0xe8}, {&(0x7f0000003000)=""/51, 0x33}, {&(0x7f0000003040)=""/188, 0xbc}, {&(0x7f0000003100)=""/174, 0xae}], 0xa, &(0x7f0000003280)=""/107, 0x6b}, 0x6}, {{0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000003300)=""/57, 0x39}, {&(0x7f0000003340)=""/48, 0x30}, {&(0x7f0000003380)=""/25, 0x19}, {&(0x7f00000033c0)=""/242, 0xf2}, {&(0x7f00000034c0)=""/186, 0xba}, {&(0x7f0000003580)=""/237, 0xed}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x7}}], 0x3, 0x2000, 0x0) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547c45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab3696c983f216075ffc018a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) (async) writev(r1, &(0x7f0000000180)=[{&(0x7f00000003c0)="e8a18d11c7f0baf80e0ae61d53be30c1b930b7eb2471c638624494b5ebe2c5bc07ac2949b6015550c41bced6bb22e8aa85d349ffed5b349c321e3ecb03d1db64004307f6a2e761f1c611e4640644810da6faaba036850eb29e12b469daa9ad44f58b30175bef804c80b2bca91a808ca1c0a40d3b73566333c2cddffcfcb15d87be57534803339769f3b2456e7b18987ef429acf6513a40aff81e758d", 0x9c}, {&(0x7f0000000000)="82220d32", 0x4}], 0x2) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) getpid() (async) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) (async) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) recvmmsg(r0, &(0x7f0000004700)=[{{&(0x7f0000000300)=@hci, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000480)=""/229, 0xe5}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x5, &(0x7f0000002b00)=""/83, 0x53}, 0x58a2}, {{&(0x7f0000002b80)=@qipcrtr, 0x80, &(0x7f00000031c0)=[{&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f0000002c00)=""/235, 0xeb}, {&(0x7f0000002d00)=""/195, 0xc3}, {&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/181, 0xb5}, {&(0x7f0000002f00)=""/232, 0xe8}, {&(0x7f0000003000)=""/51, 0x33}, {&(0x7f0000003040)=""/188, 0xbc}, {&(0x7f0000003100)=""/174, 0xae}], 0xa, &(0x7f0000003280)=""/107, 0x6b}, 0x6}, {{0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000003300)=""/57, 0x39}, {&(0x7f0000003340)=""/48, 0x30}, {&(0x7f0000003380)=""/25, 0x19}, {&(0x7f00000033c0)=""/242, 0xf2}, {&(0x7f00000034c0)=""/186, 0xba}, {&(0x7f0000003580)=""/237, 0xed}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x7}}], 0x3, 0x2000, 0x0) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (async) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) socket(0x10, 0x803, 0x0) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) 06:15:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x0, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 511.040413][T22907] loop3: detected capacity change from 0 to 128 06:15:55 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) io_setup(0x9, &(0x7f00000004c0)=0x0) io_submit(r4, 0x6, &(0x7f0000000a00)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x7, r1, &(0x7f0000000500)="6df64206ba2bd79e4103d7bd651081835695ce012867a0303d41fd7ca5b8a4017b63e24e7fd5028f7bf86f555949a9d7682afc65c42290204d34d7fa2c8d5170c6160bb44084066140133701482d8bbd18cc5a2a457a9e88e042be4408b4e670e7d813df05044a954f7164da889a4c209aa7258265160771a4b0147f", 0x7c, 0x1, 0x0, 0x0, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x401, r3, &(0x7f00000005c0)="3dc65d7420e26c5a2c048df1628ff6c10ac3fbffe63109028962eedc5860b7a9e2485623119fcb2208e9009e467860f75c51d4829d7d579b843a0a6f309c478a1d692c8f6584d6337850af7f62ea1cf100408dfeea3a15ce1ecc6a47052af5c837713b350006f7378f50360fc0e65fe55292765e2f8da2dd6adc6fccf1c51056602baeb12fff8ea027625aa39f3f53ce5ceed731c21cd5110b97acf502f2a00fc99ffd77bebe2b1827c8d156dabb928d2db65564cb30", 0xb6, 0x5, 0x0, 0x2, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f00000006c0)="d10e89095df85b1b78b8ab6da4902077a34377609b6c0d2d137f912934d12717dd333f4037f0886e03c5d90e12f087eeb12e8d7b7c5fd093a45f2aed42f6173dd8942ab61f2e4992140a43a8e98bcc4bb584f586b101a65765f3d58750cd2d8a1cd52249a3dd085cfaf0e9603f6e59985a48bd8adac4c5980adc8b902724a4725f688934cf00723c0cb85dfe801b93995be7806e6dab4780ebe3246c93a5a415d962888c198b6eace1a3886ea7689d0bff57b8d1b86d75cba918143456ec25647005846b2409ce2404befb7fb8b0ca998b6887525e1e9589e0ae85", 0xdb, 0x9, 0x0, 0x2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x81, r0, &(0x7f0000000800)="fe9b5aaddd017d721905f2435c322a50e48c99d8f0cb70d10255440dba1cdc67650781e9a1e528400de399fae732cb1db746a17704bf704cf364cb2bbde119f6a92b045ca28fd7ad14105e29cf2a1cdd99754c6e9fae6c9ca58fc88332f2ce1a9bfcf855b1bbd65d1d7d4fb012", 0x6d, 0x80, 0x0, 0x1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f00000008c0)="36370b9f8f0782a4f68838", 0xb, 0xfffffffffffffffc, 0x0, 0x1, r2}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x4, r3, &(0x7f0000000940)="19428bdef8387d980a89647613ef676f87150a0eb203a8359586cf9603d26db148265607c415ae8b776be076ed957de175211d72258c6945bf25075146232e83fe960c3ca2aa7d37613ca1ec9fc40c3eef2809cb", 0x54, 0x10001, 0x0, 0x3, r2}]) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x2e, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x2, 0x3, 0x0, 0x8, 0x3, 0xfffffffffffffff0, 0xffffffffffffffff}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x1, 0x2, 0x4, 0x7, 0x8, 0x100, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, @alu={0x7, 0x0, 0x9, 0x6, 0x1, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffe}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x39, &(0x7f0000000040)=""/57, 0x41000, 0x0, '\x00', r5, 0x0, r2, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x8, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000340)=[r2, r2, r2, r2, r2], &(0x7f0000000380)=[{0x4, 0x2, 0x4, 0xc}, {0x0, 0x5, 0x2, 0x1}, {0x1, 0x5, 0xd, 0x6}, {0x4, 0x5, 0xc, 0x3}, {0x2, 0x3, 0x9, 0x9}, {0x5, 0x3, 0xf, 0x4}, {0x2, 0x3, 0x6, 0x2}], 0x10, 0x7}, 0x90) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x0, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:56 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) io_setup(0x9, &(0x7f00000004c0)=0x0) io_submit(r4, 0x6, &(0x7f0000000a00)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x7, r1, &(0x7f0000000500)="6df64206ba2bd79e4103d7bd651081835695ce012867a0303d41fd7ca5b8a4017b63e24e7fd5028f7bf86f555949a9d7682afc65c42290204d34d7fa2c8d5170c6160bb44084066140133701482d8bbd18cc5a2a457a9e88e042be4408b4e670e7d813df05044a954f7164da889a4c209aa7258265160771a4b0147f", 0x7c, 0x1, 0x0, 0x0, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x401, r3, &(0x7f00000005c0)="3dc65d7420e26c5a2c048df1628ff6c10ac3fbffe63109028962eedc5860b7a9e2485623119fcb2208e9009e467860f75c51d4829d7d579b843a0a6f309c478a1d692c8f6584d6337850af7f62ea1cf100408dfeea3a15ce1ecc6a47052af5c837713b350006f7378f50360fc0e65fe55292765e2f8da2dd6adc6fccf1c51056602baeb12fff8ea027625aa39f3f53ce5ceed731c21cd5110b97acf502f2a00fc99ffd77bebe2b1827c8d156dabb928d2db65564cb30", 0xb6, 0x5, 0x0, 0x2, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f00000006c0)="d10e89095df85b1b78b8ab6da4902077a34377609b6c0d2d137f912934d12717dd333f4037f0886e03c5d90e12f087eeb12e8d7b7c5fd093a45f2aed42f6173dd8942ab61f2e4992140a43a8e98bcc4bb584f586b101a65765f3d58750cd2d8a1cd52249a3dd085cfaf0e9603f6e59985a48bd8adac4c5980adc8b902724a4725f688934cf00723c0cb85dfe801b93995be7806e6dab4780ebe3246c93a5a415d962888c198b6eace1a3886ea7689d0bff57b8d1b86d75cba918143456ec25647005846b2409ce2404befb7fb8b0ca998b6887525e1e9589e0ae85", 0xdb, 0x9, 0x0, 0x2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x81, r0, &(0x7f0000000800)="fe9b5aaddd017d721905f2435c322a50e48c99d8f0cb70d10255440dba1cdc67650781e9a1e528400de399fae732cb1db746a17704bf704cf364cb2bbde119f6a92b045ca28fd7ad14105e29cf2a1cdd99754c6e9fae6c9ca58fc88332f2ce1a9bfcf855b1bbd65d1d7d4fb012", 0x6d, 0x80, 0x0, 0x1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f00000008c0)="36370b9f8f0782a4f68838", 0xb, 0xfffffffffffffffc, 0x0, 0x1, r2}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x4, r3, &(0x7f0000000940)="19428bdef8387d980a89647613ef676f87150a0eb203a8359586cf9603d26db148265607c415ae8b776be076ed957de175211d72258c6945bf25075146232e83fe960c3ca2aa7d37613ca1ec9fc40c3eef2809cb", 0x54, 0x10001, 0x0, 0x3, r2}]) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x2e, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x2, 0x3, 0x0, 0x8, 0x3, 0xfffffffffffffff0, 0xffffffffffffffff}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x1, 0x2, 0x4, 0x7, 0x8, 0x100, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, @alu={0x7, 0x0, 0x9, 0x6, 0x1, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffe}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x39, &(0x7f0000000040)=""/57, 0x41000, 0x0, '\x00', r5, 0x0, r2, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x8, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000340)=[r2, r2, r2, r2, r2], &(0x7f0000000380)=[{0x4, 0x2, 0x4, 0xc}, {0x0, 0x5, 0x2, 0x1}, {0x1, 0x5, 0xd, 0x6}, {0x4, 0x5, 0xc, 0x3}, {0x2, 0x3, 0x9, 0x9}, {0x5, 0x3, 0xf, 0x4}, {0x2, 0x3, 0x6, 0x2}], 0x10, 0x7}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x2e, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x2, 0x3, 0x0, 0x8, 0x3, 0xfffffffffffffff0, 0xffffffffffffffff}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x1, 0x2, 0x4, 0x7, 0x8, 0x100, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, @alu={0x7, 0x0, 0x9, 0x6, 0x1, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffe}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x39, &(0x7f0000000040)=""/57, 0x41000, 0x0, '\x00', r5, 0x0, r2, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x8, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000340)=[r2, r2, r2, r2, r2], &(0x7f0000000380)=[{0x4, 0x2, 0x4, 0xc}, {0x0, 0x5, 0x2, 0x1}, {0x1, 0x5, 0xd, 0x6}, {0x4, 0x5, 0xc, 0x3}, {0x2, 0x3, 0x9, 0x9}, {0x5, 0x3, 0xf, 0x4}, {0x2, 0x3, 0x6, 0x2}], 0x10, 0x7}, 0x90) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x0, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) timer_create(0x2, &(0x7f0000000000)={0x0, 0x30, 0x0, @tid=r2}, &(0x7f0000000280)) 06:15:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xc000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 511.647235][T22960] loop3: detected capacity change from 0 to 128 06:15:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x0, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 512.001285][T22966] loop1: detected capacity change from 0 to 128 06:15:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x0, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x0, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) socket(0x10, 0x803, 0x0) (async) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) timer_create(0x2, &(0x7f0000000000)={0x0, 0x30, 0x0, @tid=r2}, &(0x7f0000000280)) [ 512.541072][T22975] loop3: detected capacity change from 0 to 128 06:15:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x0, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:57 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000e40)=@newtfilter={0x1cd4, 0x2c, 0x8, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0xfff3, 0xf}, {0x3, 0xd}, {0x0, 0xfff2}}, [@TCA_RATE={0x6, 0x5, {0x9b}}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @TCA_RATE={0x6, 0x5, {0x40, 0xc5}}, @TCA_RATE={0x6, 0x5, {0x2}}, @TCA_RATE={0x6, 0x5, {0x0, 0x81}}, @filter_kind_options=@f_rsvp6={{0xa}, {0x1c7c, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x81, 0x6, 0x1ff}, {0x120c5238, 0x3c, 0x7ff}, 0x5c, 0x2, 0x29}}, @TCA_RSVP_POLICE={0x464, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3f}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffffffe1, 0x3, 0x5, 0x3, 0x7, {0x1, 0x2, 0x101, 0x76, 0x15, 0x81}, {0x4, 0x0, 0xcb39, 0x179, 0x9af, 0xd1de}, 0x9, 0x400, 0xfff}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7bc}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x771, 0x4, 0x0, 0xf7e, 0xffff8001, 0x7621, 0x8, 0xffffffe1, 0x1, 0xff, 0x80, 0x200, 0x7f, 0x1, 0x40, 0xffffffff, 0xe6, 0x32, 0xffff6773, 0x3, 0x6, 0x7ff, 0x7, 0xfffff174, 0x8, 0x5, 0x8, 0x1, 0x7, 0x2, 0x6, 0x56dc540e, 0xfbae, 0x1, 0x7f, 0x5, 0x2, 0x9, 0xffffffff, 0x200, 0x8, 0x6, 0xfff, 0x7fffffff, 0x2, 0xfffffff9, 0x4, 0x1, 0x80000000, 0x0, 0xfffffffe, 0x8, 0x1, 0x3c5be320, 0x3f, 0x400, 0x5, 0xd7, 0x1, 0x1ff, 0x7ff, 0x6, 0x1, 0x1c00, 0x80000001, 0x7ff, 0x2, 0x0, 0x9, 0x2, 0x4, 0x5275, 0x49, 0x0, 0x1000, 0x7, 0x10001, 0x100, 0x4, 0xfe, 0x1ff, 0x4, 0x0, 0x3, 0x3, 0x65b8, 0x1, 0x0, 0xe630, 0x9, 0xc00000, 0x62, 0x1, 0x4, 0x7ff, 0xffffffff, 0x4, 0x80000000, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x9, 0x74f, 0x7a260b21, 0x40, 0x400, 0x0, 0x8, 0x81, 0x0, 0x10001, 0x2, 0x80000001, 0x1, 0x6, 0xe2e, 0x10000, 0xfffffffb, 0x81, 0x6, 0x200, 0x4, 0x45, 0x0, 0xcc, 0x80, 0xffffffff, 0x1, 0x71, 0x9, 0x6, 0x6, 0xc, 0x40de, 0x0, 0x1ff, 0x6, 0xee71, 0x3e08, 0xf0a7, 0x7, 0x7, 0xfffffa68, 0xfffff800, 0x5, 0x400, 0x8, 0xfffffffc, 0x1, 0xac93, 0x5, 0x101, 0x531, 0xfffff847, 0x3, 0x6, 0x87, 0x77b3, 0x6a, 0xffffff93, 0xa473, 0x9, 0x8000, 0x7f, 0x7, 0x4, 0x10001, 0x100, 0x8, 0x3ff, 0x7fffffff, 0x80000000, 0x80, 0x8, 0x80, 0x9, 0x40, 0x0, 0xffffffff, 0xa0, 0x200, 0x6, 0x5, 0x63, 0x8, 0x5, 0xffffffff, 0x3, 0x7fffffff, 0x69, 0x80000000, 0xc58, 0x8, 0x6, 0x5, 0x0, 0x200, 0x5, 0x140, 0x2, 0x0, 0x80000000, 0x4, 0x8000, 0x9, 0x2, 0x7f, 0x9, 0x4, 0x3, 0x0, 0x401, 0x2, 0xe8, 0x1, 0x2, 0x1000, 0x0, 0x706, 0x4, 0x7fff, 0x10001, 0x3, 0x9, 0x9, 0xfffffffd, 0x80000001, 0x9, 0xfffffff9, 0x7, 0x1, 0xffffff00, 0x455, 0x7, 0x1, 0x1665, 0x2, 0x40, 0x7fff, 0x3f, 0x8000, 0xffff, 0x0, 0xffff, 0x8, 0x86f9, 0x1000, 0xa6, 0x4, 0x5, 0xffffff00, 0x2, 0x80000001, 0x9]}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x1a, 0xfff1}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xa, 0x6}}, @TCA_RSVP_ACT={0x17e4, 0x6, [@m_simple={0x130, 0x10, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x20, 0x3, 0x0, 0x3, 0xd9}}, @TCA_DEF_DATA={0xd, 0x3, '(-)\\\x84--)\x00'}]}, {0xd9, 0x6, "341b2df5f01d4c7900d2a9a0151e120c1baf715555c9b851447268ed8869cde57b7c8b716b02be319545aecbea18eb175f89611b8c3fbff3a1d9e28258f40fbf6a31fd0d4e6c5f7f955823531f1c36c7fd0d956131f0166cc17426ec065b30670083f009c5028c6308a98f3468e83861591bd0a8568cf5ef29b742ee16eaaa4299af37e9d3d18c31426d0d81d49adf52b47c082e22442ce428c17dd2dfe67a74a6c3065284ae56320af86ed5071bd563780b04bdb934e43f2c455d42f0a546e40b608b7c0cb43bad8646c3ea5f4be761362a886412"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0x2dc, 0x2, 0x0, 0x0, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x94, 0x6, {0xffff, 'nat\x00', 0x5, 0x7, "2e661bfdd84012e9aa085f8583bea96e73b3b572051155bc9cf2fcc135d53fd81a1e63cbc7ee9688357e8a31824d90b512c3fd3c1d4e87a411d69662d99eaa6f451ddf13ae1a0bc64c0745e58d9082d02b90d32245235f0ef5319b5c5c25952227ac73b432fd5783a928"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x102, 0x6, {0x0, 'mangle\x00', 0x0, 0x0, "e2f502edfa32faca657169cb5ab3e36b3ac26002a954d22f6cc4a4412e45863bf50a763c6d2f5977e7026437ebad35e8f6679213c0aea1105a6b8059f61084fa4924bb66da979df809c4fbc77f77b95b5519949502f049d1be31f37c6629a65eab91cbbe44eda47e45ec5bf5e5ffd197dafe23d252cad6eb311e809cedc61c45e1863c2e668977d6a3d50077db78cd6d1b003983c93b9250ebd7442a2f42b96f59347f18428035d5e9ecf550a002ca089026cd6e98d6ec00f80a170241f8a4c8afd3c59d3b0efd60271ade6fed1c63f799ac324280e59dda"}}, @TCA_IPT_TARG={0x66, 0x6, {0xfff, 'raw\x00', 0x64, 0x0, "51f92b9736b527797eed0373ca476a27d00869451c183d3d73608edfe0a0df03984e2c23103626e58fb7610e13d33a45500c6e575f92756d3375962e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}]}, {0x9c, 0x6, "e02b9016c9fc94802d429dd98ddbcaaa644dfda0c495fcdbcadc318578995e5e34d0fbdc9be7879ea004c82a61526e457cc2239ccf7cfd2189bd7231b938d6a4177be65eae4f5e7f1298b76543864c1103a617b1c49278f2b1603ad02f3a182961374078ee368a36b16265267d933d16a74893dc6b64bf4a8d04b6d11abadaa453739320e7b226ab777c30c6945a94ca257719022cb938e7"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_pedit={0x140, 0xf, 0x0, 0x0, {{0xa}, {0x98, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x3c, 0x5, 0x0, 0x1, [{0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}]}, @TCA_PEDIT_KEYS_EX={0x58, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}]}, {0x7f, 0x6, "de7f5cf5e355e28ca73a9bc13813512059083d907960acb61a8c717e52976672b28811dc95fcccb35a77d9acacb34768b6300f8a147388a05f9cdfbc23da8be8218943d685757d34072d14470fea33fdb1473ac951fe3d6a1d88af25c7da5700d63b3641f0d45c7a48b9198ce53a54eb53ae7c407a064e77611d3d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_simple={0x1058, 0x18, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x7, 0x5, 0x7, 0x8}}, @TCA_DEF_DATA={0xf, 0x3, '[[\x1a^:$!-).\x00'}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_skbedit={0x70, 0x20, 0x0, 0x0, {{0xc}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x9}]}, {0x3a, 0x6, "5c74ccf48299a9f5d715f66c4b032aabf33db38c58a60df55696dc482207cf95c5c8aa99c422ce694325a1f4a8713a0455faa68890c1"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_bpf={0xb0, 0x14, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x80, 0x3, 0x2, 0x7}, {0x1, 0x7f, 0xff, 0x5c3}, {0xc1, 0x1, 0x5, 0x6}, {0x3, 0x3, 0x6, 0x9}, {0x4e3c, 0x80, 0x9, 0x1}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x1, 0x5, 0x20, 0x30}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7, 0x8, 0x5, 0x80000000, 0x80000000}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x1}]}, {0x6, 0x6, "1d20"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_connmark={0x11c, 0x1e, 0x0, 0x0, {{0xd}, {0xac, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xe56, 0x0, 0x2, 0xfffffffe, 0x5}, 0x200}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0xa780, 0x10000000, 0x2, 0xf0}, 0xfff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x87, 0x1000, 0x0, 0x9, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x1, 0x3, 0x2, 0x7}, 0xfffd}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x80000001, 0xffffffffffffffff, 0x7, 0xffff}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffc0, 0xffffffc4, 0x8, 0x9e, 0x7}, 0x7}}]}, {0x43, 0x6, "c64a1011b5d8cc59a9763c771be0e4aedd68810e56994cbdfa3be0137484348ac596c118ff88e73c7919903f5f7d6977336eb29c660f30d1e68045b982d268"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x1cd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(r3, &(0x7f00000001c0)='blkio.bfq.empty_time\x00', 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x0, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:15:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x0, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xe000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 513.088673][T22988] loop4: detected capacity change from 0 to 128 [ 513.192947][T22990] loop1: detected capacity change from 0 to 128 06:15:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x0, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:57 executing program 5: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='#\x00') shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x0, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0x0, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:58 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000e40)=@newtfilter={0x1cd4, 0x2c, 0x8, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0xfff3, 0xf}, {0x3, 0xd}, {0x0, 0xfff2}}, [@TCA_RATE={0x6, 0x5, {0x9b}}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @TCA_RATE={0x6, 0x5, {0x40, 0xc5}}, @TCA_RATE={0x6, 0x5, {0x2}}, @TCA_RATE={0x6, 0x5, {0x0, 0x81}}, @filter_kind_options=@f_rsvp6={{0xa}, {0x1c7c, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x81, 0x6, 0x1ff}, {0x120c5238, 0x3c, 0x7ff}, 0x5c, 0x2, 0x29}}, @TCA_RSVP_POLICE={0x464, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3f}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffffffe1, 0x3, 0x5, 0x3, 0x7, {0x1, 0x2, 0x101, 0x76, 0x15, 0x81}, {0x4, 0x0, 0xcb39, 0x179, 0x9af, 0xd1de}, 0x9, 0x400, 0xfff}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7bc}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x771, 0x4, 0x0, 0xf7e, 0xffff8001, 0x7621, 0x8, 0xffffffe1, 0x1, 0xff, 0x80, 0x200, 0x7f, 0x1, 0x40, 0xffffffff, 0xe6, 0x32, 0xffff6773, 0x3, 0x6, 0x7ff, 0x7, 0xfffff174, 0x8, 0x5, 0x8, 0x1, 0x7, 0x2, 0x6, 0x56dc540e, 0xfbae, 0x1, 0x7f, 0x5, 0x2, 0x9, 0xffffffff, 0x200, 0x8, 0x6, 0xfff, 0x7fffffff, 0x2, 0xfffffff9, 0x4, 0x1, 0x80000000, 0x0, 0xfffffffe, 0x8, 0x1, 0x3c5be320, 0x3f, 0x400, 0x5, 0xd7, 0x1, 0x1ff, 0x7ff, 0x6, 0x1, 0x1c00, 0x80000001, 0x7ff, 0x2, 0x0, 0x9, 0x2, 0x4, 0x5275, 0x49, 0x0, 0x1000, 0x7, 0x10001, 0x100, 0x4, 0xfe, 0x1ff, 0x4, 0x0, 0x3, 0x3, 0x65b8, 0x1, 0x0, 0xe630, 0x9, 0xc00000, 0x62, 0x1, 0x4, 0x7ff, 0xffffffff, 0x4, 0x80000000, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x9, 0x74f, 0x7a260b21, 0x40, 0x400, 0x0, 0x8, 0x81, 0x0, 0x10001, 0x2, 0x80000001, 0x1, 0x6, 0xe2e, 0x10000, 0xfffffffb, 0x81, 0x6, 0x200, 0x4, 0x45, 0x0, 0xcc, 0x80, 0xffffffff, 0x1, 0x71, 0x9, 0x6, 0x6, 0xc, 0x40de, 0x0, 0x1ff, 0x6, 0xee71, 0x3e08, 0xf0a7, 0x7, 0x7, 0xfffffa68, 0xfffff800, 0x5, 0x400, 0x8, 0xfffffffc, 0x1, 0xac93, 0x5, 0x101, 0x531, 0xfffff847, 0x3, 0x6, 0x87, 0x77b3, 0x6a, 0xffffff93, 0xa473, 0x9, 0x8000, 0x7f, 0x7, 0x4, 0x10001, 0x100, 0x8, 0x3ff, 0x7fffffff, 0x80000000, 0x80, 0x8, 0x80, 0x9, 0x40, 0x0, 0xffffffff, 0xa0, 0x200, 0x6, 0x5, 0x63, 0x8, 0x5, 0xffffffff, 0x3, 0x7fffffff, 0x69, 0x80000000, 0xc58, 0x8, 0x6, 0x5, 0x0, 0x200, 0x5, 0x140, 0x2, 0x0, 0x80000000, 0x4, 0x8000, 0x9, 0x2, 0x7f, 0x9, 0x4, 0x3, 0x0, 0x401, 0x2, 0xe8, 0x1, 0x2, 0x1000, 0x0, 0x706, 0x4, 0x7fff, 0x10001, 0x3, 0x9, 0x9, 0xfffffffd, 0x80000001, 0x9, 0xfffffff9, 0x7, 0x1, 0xffffff00, 0x455, 0x7, 0x1, 0x1665, 0x2, 0x40, 0x7fff, 0x3f, 0x8000, 0xffff, 0x0, 0xffff, 0x8, 0x86f9, 0x1000, 0xa6, 0x4, 0x5, 0xffffff00, 0x2, 0x80000001, 0x9]}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x1a, 0xfff1}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xa, 0x6}}, @TCA_RSVP_ACT={0x17e4, 0x6, [@m_simple={0x130, 0x10, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x20, 0x3, 0x0, 0x3, 0xd9}}, @TCA_DEF_DATA={0xd, 0x3, '(-)\\\x84--)\x00'}]}, {0xd9, 0x6, "341b2df5f01d4c7900d2a9a0151e120c1baf715555c9b851447268ed8869cde57b7c8b716b02be319545aecbea18eb175f89611b8c3fbff3a1d9e28258f40fbf6a31fd0d4e6c5f7f955823531f1c36c7fd0d956131f0166cc17426ec065b30670083f009c5028c6308a98f3468e83861591bd0a8568cf5ef29b742ee16eaaa4299af37e9d3d18c31426d0d81d49adf52b47c082e22442ce428c17dd2dfe67a74a6c3065284ae56320af86ed5071bd563780b04bdb934e43f2c455d42f0a546e40b608b7c0cb43bad8646c3ea5f4be761362a886412"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0x2dc, 0x2, 0x0, 0x0, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x94, 0x6, {0xffff, 'nat\x00', 0x5, 0x7, "2e661bfdd84012e9aa085f8583bea96e73b3b572051155bc9cf2fcc135d53fd81a1e63cbc7ee9688357e8a31824d90b512c3fd3c1d4e87a411d69662d99eaa6f451ddf13ae1a0bc64c0745e58d9082d02b90d32245235f0ef5319b5c5c25952227ac73b432fd5783a928"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x102, 0x6, {0x0, 'mangle\x00', 0x0, 0x0, "e2f502edfa32faca657169cb5ab3e36b3ac26002a954d22f6cc4a4412e45863bf50a763c6d2f5977e7026437ebad35e8f6679213c0aea1105a6b8059f61084fa4924bb66da979df809c4fbc77f77b95b5519949502f049d1be31f37c6629a65eab91cbbe44eda47e45ec5bf5e5ffd197dafe23d252cad6eb311e809cedc61c45e1863c2e668977d6a3d50077db78cd6d1b003983c93b9250ebd7442a2f42b96f59347f18428035d5e9ecf550a002ca089026cd6e98d6ec00f80a170241f8a4c8afd3c59d3b0efd60271ade6fed1c63f799ac324280e59dda"}}, @TCA_IPT_TARG={0x66, 0x6, {0xfff, 'raw\x00', 0x64, 0x0, "51f92b9736b527797eed0373ca476a27d00869451c183d3d73608edfe0a0df03984e2c23103626e58fb7610e13d33a45500c6e575f92756d3375962e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}]}, {0x9c, 0x6, "e02b9016c9fc94802d429dd98ddbcaaa644dfda0c495fcdbcadc318578995e5e34d0fbdc9be7879ea004c82a61526e457cc2239ccf7cfd2189bd7231b938d6a4177be65eae4f5e7f1298b76543864c1103a617b1c49278f2b1603ad02f3a182961374078ee368a36b16265267d933d16a74893dc6b64bf4a8d04b6d11abadaa453739320e7b226ab777c30c6945a94ca257719022cb938e7"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_pedit={0x140, 0xf, 0x0, 0x0, {{0xa}, {0x98, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x3c, 0x5, 0x0, 0x1, [{0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}]}, @TCA_PEDIT_KEYS_EX={0x58, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}]}, {0x7f, 0x6, "de7f5cf5e355e28ca73a9bc13813512059083d907960acb61a8c717e52976672b28811dc95fcccb35a77d9acacb34768b6300f8a147388a05f9cdfbc23da8be8218943d685757d34072d14470fea33fdb1473ac951fe3d6a1d88af25c7da5700d63b3641f0d45c7a48b9198ce53a54eb53ae7c407a064e77611d3d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_simple={0x1058, 0x18, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x7, 0x5, 0x7, 0x8}}, @TCA_DEF_DATA={0xf, 0x3, '[[\x1a^:$!-).\x00'}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_skbedit={0x70, 0x20, 0x0, 0x0, {{0xc}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x9}]}, {0x3a, 0x6, "5c74ccf48299a9f5d715f66c4b032aabf33db38c58a60df55696dc482207cf95c5c8aa99c422ce694325a1f4a8713a0455faa68890c1"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_bpf={0xb0, 0x14, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x80, 0x3, 0x2, 0x7}, {0x1, 0x7f, 0xff, 0x5c3}, {0xc1, 0x1, 0x5, 0x6}, {0x3, 0x3, 0x6, 0x9}, {0x4e3c, 0x80, 0x9, 0x1}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x1, 0x5, 0x20, 0x30}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7, 0x8, 0x5, 0x80000000, 0x80000000}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x1}]}, {0x6, 0x6, "1d20"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_connmark={0x11c, 0x1e, 0x0, 0x0, {{0xd}, {0xac, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xe56, 0x0, 0x2, 0xfffffffe, 0x5}, 0x200}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0xa780, 0x10000000, 0x2, 0xf0}, 0xfff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x87, 0x1000, 0x0, 0x9, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x1, 0x3, 0x2, 0x7}, 0xfffd}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x80000001, 0xffffffffffffffff, 0x7, 0xffff}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffc0, 0xffffffc4, 0x8, 0x9e, 0x7}, 0x7}}]}, {0x43, 0x6, "c64a1011b5d8cc59a9763c771be0e4aedd68810e56994cbdfa3be0137484348ac596c118ff88e73c7919903f5f7d6977336eb29c660f30d1e68045b982d268"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x1cd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000e40)=@newtfilter={0x1cd4, 0x2c, 0x8, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0xfff3, 0xf}, {0x3, 0xd}, {0x0, 0xfff2}}, [@TCA_RATE={0x6, 0x5, {0x9b}}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @TCA_RATE={0x6, 0x5, {0x40, 0xc5}}, @TCA_RATE={0x6, 0x5, {0x2}}, @TCA_RATE={0x6, 0x5, {0x0, 0x81}}, @filter_kind_options=@f_rsvp6={{0xa}, {0x1c7c, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x81, 0x6, 0x1ff}, {0x120c5238, 0x3c, 0x7ff}, 0x5c, 0x2, 0x29}}, @TCA_RSVP_POLICE={0x464, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3f}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffffffe1, 0x3, 0x5, 0x3, 0x7, {0x1, 0x2, 0x101, 0x76, 0x15, 0x81}, {0x4, 0x0, 0xcb39, 0x179, 0x9af, 0xd1de}, 0x9, 0x400, 0xfff}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7bc}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x771, 0x4, 0x0, 0xf7e, 0xffff8001, 0x7621, 0x8, 0xffffffe1, 0x1, 0xff, 0x80, 0x200, 0x7f, 0x1, 0x40, 0xffffffff, 0xe6, 0x32, 0xffff6773, 0x3, 0x6, 0x7ff, 0x7, 0xfffff174, 0x8, 0x5, 0x8, 0x1, 0x7, 0x2, 0x6, 0x56dc540e, 0xfbae, 0x1, 0x7f, 0x5, 0x2, 0x9, 0xffffffff, 0x200, 0x8, 0x6, 0xfff, 0x7fffffff, 0x2, 0xfffffff9, 0x4, 0x1, 0x80000000, 0x0, 0xfffffffe, 0x8, 0x1, 0x3c5be320, 0x3f, 0x400, 0x5, 0xd7, 0x1, 0x1ff, 0x7ff, 0x6, 0x1, 0x1c00, 0x80000001, 0x7ff, 0x2, 0x0, 0x9, 0x2, 0x4, 0x5275, 0x49, 0x0, 0x1000, 0x7, 0x10001, 0x100, 0x4, 0xfe, 0x1ff, 0x4, 0x0, 0x3, 0x3, 0x65b8, 0x1, 0x0, 0xe630, 0x9, 0xc00000, 0x62, 0x1, 0x4, 0x7ff, 0xffffffff, 0x4, 0x80000000, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x9, 0x74f, 0x7a260b21, 0x40, 0x400, 0x0, 0x8, 0x81, 0x0, 0x10001, 0x2, 0x80000001, 0x1, 0x6, 0xe2e, 0x10000, 0xfffffffb, 0x81, 0x6, 0x200, 0x4, 0x45, 0x0, 0xcc, 0x80, 0xffffffff, 0x1, 0x71, 0x9, 0x6, 0x6, 0xc, 0x40de, 0x0, 0x1ff, 0x6, 0xee71, 0x3e08, 0xf0a7, 0x7, 0x7, 0xfffffa68, 0xfffff800, 0x5, 0x400, 0x8, 0xfffffffc, 0x1, 0xac93, 0x5, 0x101, 0x531, 0xfffff847, 0x3, 0x6, 0x87, 0x77b3, 0x6a, 0xffffff93, 0xa473, 0x9, 0x8000, 0x7f, 0x7, 0x4, 0x10001, 0x100, 0x8, 0x3ff, 0x7fffffff, 0x80000000, 0x80, 0x8, 0x80, 0x9, 0x40, 0x0, 0xffffffff, 0xa0, 0x200, 0x6, 0x5, 0x63, 0x8, 0x5, 0xffffffff, 0x3, 0x7fffffff, 0x69, 0x80000000, 0xc58, 0x8, 0x6, 0x5, 0x0, 0x200, 0x5, 0x140, 0x2, 0x0, 0x80000000, 0x4, 0x8000, 0x9, 0x2, 0x7f, 0x9, 0x4, 0x3, 0x0, 0x401, 0x2, 0xe8, 0x1, 0x2, 0x1000, 0x0, 0x706, 0x4, 0x7fff, 0x10001, 0x3, 0x9, 0x9, 0xfffffffd, 0x80000001, 0x9, 0xfffffff9, 0x7, 0x1, 0xffffff00, 0x455, 0x7, 0x1, 0x1665, 0x2, 0x40, 0x7fff, 0x3f, 0x8000, 0xffff, 0x0, 0xffff, 0x8, 0x86f9, 0x1000, 0xa6, 0x4, 0x5, 0xffffff00, 0x2, 0x80000001, 0x9]}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x1a, 0xfff1}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xa, 0x6}}, @TCA_RSVP_ACT={0x17e4, 0x6, [@m_simple={0x130, 0x10, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x20, 0x3, 0x0, 0x3, 0xd9}}, @TCA_DEF_DATA={0xd, 0x3, '(-)\\\x84--)\x00'}]}, {0xd9, 0x6, "341b2df5f01d4c7900d2a9a0151e120c1baf715555c9b851447268ed8869cde57b7c8b716b02be319545aecbea18eb175f89611b8c3fbff3a1d9e28258f40fbf6a31fd0d4e6c5f7f955823531f1c36c7fd0d956131f0166cc17426ec065b30670083f009c5028c6308a98f3468e83861591bd0a8568cf5ef29b742ee16eaaa4299af37e9d3d18c31426d0d81d49adf52b47c082e22442ce428c17dd2dfe67a74a6c3065284ae56320af86ed5071bd563780b04bdb934e43f2c455d42f0a546e40b608b7c0cb43bad8646c3ea5f4be761362a886412"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0x2dc, 0x2, 0x0, 0x0, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x94, 0x6, {0xffff, 'nat\x00', 0x5, 0x7, "2e661bfdd84012e9aa085f8583bea96e73b3b572051155bc9cf2fcc135d53fd81a1e63cbc7ee9688357e8a31824d90b512c3fd3c1d4e87a411d69662d99eaa6f451ddf13ae1a0bc64c0745e58d9082d02b90d32245235f0ef5319b5c5c25952227ac73b432fd5783a928"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x102, 0x6, {0x0, 'mangle\x00', 0x0, 0x0, "e2f502edfa32faca657169cb5ab3e36b3ac26002a954d22f6cc4a4412e45863bf50a763c6d2f5977e7026437ebad35e8f6679213c0aea1105a6b8059f61084fa4924bb66da979df809c4fbc77f77b95b5519949502f049d1be31f37c6629a65eab91cbbe44eda47e45ec5bf5e5ffd197dafe23d252cad6eb311e809cedc61c45e1863c2e668977d6a3d50077db78cd6d1b003983c93b9250ebd7442a2f42b96f59347f18428035d5e9ecf550a002ca089026cd6e98d6ec00f80a170241f8a4c8afd3c59d3b0efd60271ade6fed1c63f799ac324280e59dda"}}, @TCA_IPT_TARG={0x66, 0x6, {0xfff, 'raw\x00', 0x64, 0x0, "51f92b9736b527797eed0373ca476a27d00869451c183d3d73608edfe0a0df03984e2c23103626e58fb7610e13d33a45500c6e575f92756d3375962e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}]}, {0x9c, 0x6, "e02b9016c9fc94802d429dd98ddbcaaa644dfda0c495fcdbcadc318578995e5e34d0fbdc9be7879ea004c82a61526e457cc2239ccf7cfd2189bd7231b938d6a4177be65eae4f5e7f1298b76543864c1103a617b1c49278f2b1603ad02f3a182961374078ee368a36b16265267d933d16a74893dc6b64bf4a8d04b6d11abadaa453739320e7b226ab777c30c6945a94ca257719022cb938e7"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_pedit={0x140, 0xf, 0x0, 0x0, {{0xa}, {0x98, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x3c, 0x5, 0x0, 0x1, [{0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}]}, @TCA_PEDIT_KEYS_EX={0x58, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}]}, {0x7f, 0x6, "de7f5cf5e355e28ca73a9bc13813512059083d907960acb61a8c717e52976672b28811dc95fcccb35a77d9acacb34768b6300f8a147388a05f9cdfbc23da8be8218943d685757d34072d14470fea33fdb1473ac951fe3d6a1d88af25c7da5700d63b3641f0d45c7a48b9198ce53a54eb53ae7c407a064e77611d3d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_simple={0x1058, 0x18, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x7, 0x5, 0x7, 0x8}}, @TCA_DEF_DATA={0xf, 0x3, '[[\x1a^:$!-).\x00'}]}, {0x1004, 0x6, "1eb17756a7ec26fe6f9458c827138737fa4e2dfbd49bae052844795768be027d2060be0db734fbecb65de4d5e2ce1d7b91fa03ab1ae58cbea3ed64b045b6d1319aaa93fa4053006c7a80c35d78dae1a8e16fc5e5a3c3b988fe17fd9bc9c173583ba53babf211711dd45cdbec5697bcfcd43f7f2219f844c2db23b9e7c2092682b2b271b668b60e13de90a5e8670d243aedef503fed1de90240dfbd3b7baa7e64b77b5cb20630a2be0aaa1b90edb560eb9e3cf3b26f063b3e6390d0e1ae2d5b391c4e95a1b897b945ab1f89b24480b0b448ff23f094bf50f39fc9b476f153aa3a610f42833700c9ff6f3a92352e44cb969cd15f9f684b86a2f908d4b5701ea055fc13e096aaeeb0a99826e8b7c879b1e0063044219ef771c98ac9e443631ea24e7836942adb0118789e1e7477dc5878b8888409c8665e0da5273c9644dfe1a393841d1cadc881534b5a22fb5ecfa3a7410b18c3a456935f47c6a1e241e8d40a52a457cbc7354ab62d0778e3d317a841cf4d1efb1d389a4b0cdf0c702c0dafa0fa8c4e9f2cd93384b6402eba1f5a7492385e48af3e6ac32de8c08b43ed511d3e33c50262d9df4db9c8be63b949249c33c13a3cf1dae60d5db60619944f8e9efd9ab4f03b301c8d8eea642a6b27e18469917a0c23f11b0150d2d1915ade9e972f2cf5c2067167f5dd8ea8bb5e66016a5cf5431051ff810730090045f63631397eff9c8525a833110d098972b6b2da60533190657b62ff13875a7b9b24b84b646288266c804b2c7626d80df627cb7c2b3a424ce05769df1d3ca915725bf582d1a092010856e6475534a4ecb0e91589ae9cc86f9e63e57ce781a23586b8d3548381c5f3836e6a917c91cfdc1f6a0955700c05a0d152a063e450df7181cf4b91192661300b2bb2523487016ac4e252fa2b2b32f58ff9b91166f227a4a4de00d62ca52ce2f242ef926b2fa86884e8bcc732c620a28be7059c98d6b8e0bcff830b97f56e6776e8e4eb572b3112e206eae64b9ad1d934125429614f6a0d1d112d3008061b44ecc38ca82a142f637779c1ecc2d21c1b4601f48f50f71d6d66f6da107fce1371a0c2572f23c63ab31bd6e3eb91241d3b8f3895ae6f50709a595465e036996f80260633f9b958327a054e6839fb19aa88495c140a7d69c5a1c16d181f26669c528e648f6aa91cace3a8a789394d673d6460a8be31cef72dadc0665933290499db4f350ed42c911ac81e3d804d066487f638a40d6103451c99c062cd28f8bf843b34fc2ea17c5ceffde5f8aca40ad2aee63ad4921160d9ae3e0009c1349ebeaf4f123cc13b64b14c4a9f02aea37d6db145a6979883f1b3f64a4bc6d191d2846a776d531c5053c6dd31c38f162c4c67428d6294217e36640a3e820e139a8645271f7960ec87ae178f98c83d6ca1c2406564f32b2e50d612d4baa764cadf2bf5971e7e1fe1414919b68027af1a7644410950627aa8658cd9cd53476a6482e92cd90d76c055223d59b49a068035e949c7147ca41722344a8c2ac3d5e4ec0068280e6c8ebbc40ae80c118000286e827b1caaaca48de5979ab21df1daded8c3b84c03c28909dbd03fd880a0647340ba875b95fe56b235215b870db5edd788e4af8e8af47683d18387db5312c08cdff9623a0b65929edb4bdd25726159da7b7d449dd4b73c211ce74504c65f27169270d1672d4eb3f7b9a9bd07e7d30273573125426134b311291515c19015b4551b419dd7253cca0eb601a132375e000f213052ae974eb815e7550638cece20d5093ec5b83ab61933715279d5bb3477c8139847ef2358a6e3bd997f7e7b58a2632bfca54b98230684bc7a1801f97280aabab26cb3a8803946660090beecaf5a3251b01cba050e20cbeab671a767d2ac33b13df0650b003f30bf4d4879efa13d97d0aed28444546e834b140205797877da39ee518f8d4a6efcbd095dd46638c8bdca6ae8d58893fb1eb84a21af72d9f4c9537754f7dcbb0489acee7a8e021203561084fe5917d4508b8e4fec4c7c1480d8ab055fff8d99c92109856889091b09e214c8e58101355ffb53eadf73b287c5814abc756a427d83c1cce63ad8cf051082c05d95ac3899d9c1732c5b325a5078817d130022125a38f8af325e91301c57adb42b030095d2224a26472fb576cfd8e20aa8fd75084cf3da6ed604c6205b37256c9006f835c9f03f67af4d75c8c61e74f4fe8110c2067623d51040f632bd0296d70719ae400a145ac59d649afc6fbe6dccd8f543da7f6e0c5298ce01402f0f19d5747e56c9ff2b6d81955f1d3397060777fba46aa3c27450c5942eb986a12791517d2f5be0f0c5176149e22b28aea32d3fb396c2e3ff545040f5a4d64a795a2ab39d3e687480d227bdf67ba552d8f6f05678ac0cc6a5901495765bfecd7d3dee5a272209ab3127aeb8a338857be4f9e1a6cc15e9448a3e3bcc92c25f1317fa063bd2170a68992fb8e3286e478dbddc99676fec20a0af1caa44fa07ae451add577be04d0c87a4f814448c58d0f289f7d22bf8c8d8b8d2f33e326c4cf5149ee66a53db102ac3bb44ad842cddeb9922ce8f5691d3672ce8da19557d70dd8b7d1b3ab592d5a64c8c142c247742775433cd24c729b6b1fdf91ffcafcbd533691d44c8ac929130faf3b2e05fcc6e8a35b7f822b11d64a1ae70e2e9070014db76d6fa32041c463c8da94630cadd95282b064be244bd31d7db19372c17f108cfdb82e1f5dd5c6e9cd003ca3e07b29d0ca8f7ac0b67a4024a69b3b19274066f6b478f6fc79e29fcf0613529db29977bd576445776ddacb7b054192de4b816789ebe43a1c44c8fa29d7c3fa9f786ed42353907e04e7d8fcaf3c56d22dba75eb6705a9113ec1d66c903f4f13aaafa314784c3c5f2895ddbdfdaa551c6019aac1662ecfb6c0c9b107ac90d18cd462911dffe7cda1f3126c84552a8477d1093be04adf0aaa58eecec3e0b0105aa4d45b0afcb2e04ff994db6b4e7008585c35f82087394ace08150cb2a4b831f444643de804b0342004f71a9079a7deece21b663928ee56ddc64b3b815996b9fb04a985476dda2954bef30852d094204cc1c400ad3c7e52e9d22e95d6c71e2f074fcc97c8c043e99f0adcdd3a0491b3e101dd6d5b4de3cb8108280e6facc4995213228d423a3024d97e6c24394a0b3d585ee6f585001769ed6a9f40c0797a01a318f2e9b42a04d6271e178e251859cd090eaec2ac48cae943194ebbcf83e749894e0d12203094850826a64c9738fa98406d0205630140200b34db17fe58a0ccd007ea5d2319147e6dd13d8b0f9bf544c539ad9eb71f21677e05b043ed3aeebd70061380106926acd430dfed90cdebb1db0ef484d5ef4e50b5c7a7a9bc23c8cf99ac950b853fbfd8c7e0b7919a3e21d775e76b290d495e9eaac532a81d4cb56c19b524d944e2cb1b4fc33f58620428245b805c70932025abdcf0082052c7a955630f193838228fbb353654c9f0e696a02ec24c89eb0f62283629c405f049b3dce1f6fe9445fea9534dbc29fe487a93c2c7e29323caf9a7afd7f9b03097f2249fa064fcc05807c08c2801a6725e4e2b1d7464980366a1d232e574e3ee77f2188670e979c8a376c845ba09938ed0661f2252a09e6418d4a99b817219361bad4c5d26030679c2ba7595a7691f9682f39a439b2b8951d71f0d5e9aa2aa27b4d76fffd43d9881b21abfaf6c55eeace31981b0eb3a8bfef7261247eb96073c7dd01d0f5c8ab2090d221b9d895b9555976688e53fb3475661b3ff76a981a1cf4e3b1faebbe8788918f5170091bd31c6fd47c13d3d22f1151413fd65643e920349221482c93feb576d4600659571cb736ed2dff1b1a90739bf717d5db34a33076eb9289ae48300249eab33822d2d44648f9818a0befd6d27cd2445772998e7bb57df248ec76177ea919522fc5ecaf213012c1261616465aa0cc66aba5e56978d397c6d226d410c50d3ba9b714dc2522df309a5f9984e56c5068732594dd207f32b950f7145752dd0ae49097319eda6428016daa4ac1cf88b89ea2452f036b9d0000d054d5c8e153d7bebe5246ca230cf300ea468fe730044ca8cf3f2c8bb01be30da530b0ee85cbc3f9bbb1a6e81e2ae6578686d6c5e80151a5d4226d2546393ae482368ed2a006a7f86225d47d71ca15b337fd4e869773f984a5c850641f11ef1ebf5414340a3117e4ac0c196441c32c124d3ef81bdc4c146aba6c62d3d1b87a737a2699e46a49c796f5a354e7aebcd3580809e825fbc0d7ded49de576fd551a144f43265e3c6a20a883f953a58f159bf7ff3801f23d21b0ab7310fec66fb54daba8185707a9caddc9c819fe0a3109863d01c8bf4a9cae75045e2d19b01c84267a6e697f086d29cc3afea700577d0407dcf67d753d8a8e8da45f8d17cca1e3e34a4b67b09a8dd40835a664c6496a9182e3b2a89b1e4918bef4e1eda995090a8c148952552784bb3bb92c2bdfc5c39d214400cb5bb9d5c7590d9273c9c77c80e4bb1c59e6062d852df8fe2e99fe1fae697489bce94667bd7797cd4bd0ff20ec188bb23541270eb394a57e9c8daf4fee438839ce08bcf4faa379082ac679d709a02ee34306a43c6d1f362392011c282b2ee301cd21cd5ad064068d5f3c6e03a2a08453f4c870ad8d4f284eddb9b9936d2997272315556f8eac607fda3c3dc5c3a8bc3f2bccffa8b4f510b2cc671b7ea5a37aaac332e77b45c1f59ea34ea23ba7f419c7b011ef4de599293d8000edf7657da804795855daeafc119270418fd23281fa24e3f38dbb34a8e0d4247ac6edd2f6a570627ef6f52da16ee14c4930c13d2848b6d87cabe4575367acf5c9cfb8e83b277422d63b94d524aedec109ff45f657723b1423ad97dface9a5c311a42ba4825265661ab68fe623cf3e2d32049c20af39c85f85ca9a3f7b36e91416f30b13ed03d2421d722c5a5b64e4aa273dca32fce9b9eabc8e88b7f35e2aaf13e5a4be6027b5ba09efa58d12f45890b747556310b119909fc1d402c8c72b62ddad381956d882a17a5fe3a711f4f09f41d9ca838be9ec3c5820878772596c983e7d00f2d6f6fb3847a94cbc1eb07d149f38d3f8191da044a79c3042dcb699f28bfc5f0e00fd23afd50daf24c46dc622f7fd431279cdeb2ad894bffb92800ae516d0a56d29813326d531af6cdf1bf0d2eae97c3a7d9ebdc76a27c1d3f66988e0577b3a487b2911752219595a5cb195c6a6e653de62a990f32b4464600f2256df1886044dd24eefb152ae3c25840b76bc90b3880eeecdba1501a88b971cca3305779c951e0361e1637ecfe258345d2393aa1ffd982877552869a12e67138790c470eadbec76fcb514a49155e1c586d2f4768f6588797d809bc13774d2861123f18fd6f6bed7996d03d6077f4c999613fb61fd9951a5090dc4c98812784c90907e4f90c70e0bc4b7f4f84c1b2b007b8333121687a021b93901dc83166bf342427e31c86402dc1bebc212016d95496a16d5618f9fff9354f2eb1f839afe4d134a7fdb8a6a6daaa0f0018047236c5b125a4622db934d2968adff257de5a47c92e857ee688f1fb52861efafe56d83c8950dd68292232e6242da23656ffff383993295b49e4bd1876723e849052e6071a192976feab88647f731e33f0ee2e405582ff0837e867eb45f30380cf6d52d06fd167d3539dabd67ba395e0e622636c0e053ec62620839bf9c9a2b63fd765216f24999c4b5e1335eb211d8c13b7101ca6b4ae398a133e8dadfe49b52501e97a1c53e55f62bf6a5f8a0f9f2cd7146fb8283ab29ef6d118754784b2a"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_skbedit={0x70, 0x20, 0x0, 0x0, {{0xc}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x9}]}, {0x3a, 0x6, "5c74ccf48299a9f5d715f66c4b032aabf33db38c58a60df55696dc482207cf95c5c8aa99c422ce694325a1f4a8713a0455faa68890c1"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_bpf={0xb0, 0x14, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x80, 0x3, 0x2, 0x7}, {0x1, 0x7f, 0xff, 0x5c3}, {0xc1, 0x1, 0x5, 0x6}, {0x3, 0x3, 0x6, 0x9}, {0x4e3c, 0x80, 0x9, 0x1}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x1, 0x5, 0x20, 0x30}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7, 0x8, 0x5, 0x80000000, 0x80000000}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x1}]}, {0x6, 0x6, "1d20"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_connmark={0x11c, 0x1e, 0x0, 0x0, {{0xd}, {0xac, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xe56, 0x0, 0x2, 0xfffffffe, 0x5}, 0x200}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0xa780, 0x10000000, 0x2, 0xf0}, 0xfff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x87, 0x1000, 0x0, 0x9, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x1, 0x3, 0x2, 0x7}, 0xfffd}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x80000001, 0xffffffffffffffff, 0x7, 0xffff}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffc0, 0xffffffc4, 0x8, 0x9e, 0x7}, 0x7}}]}, {0x43, 0x6, "c64a1011b5d8cc59a9763c771be0e4aedd68810e56994cbdfa3be0137484348ac596c118ff88e73c7919903f5f7d6977336eb29c660f30d1e68045b982d268"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x1cd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(r3, &(0x7f00000001c0)='blkio.bfq.empty_time\x00', 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:15:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0x0, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:58 executing program 5: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (async) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='#\x00') (async, rerun: 32) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async, rerun: 32) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:58 executing program 5: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='#\x00') shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async, rerun: 32) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) timer_create(0x2, &(0x7f0000000000)={0x0, 0x30, 0x0, @tid=r2}, &(0x7f0000000280)) 06:15:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0x0, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x2010050, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES16=r0, @ANYRES64, @ANYRESHEX=r0], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 513.984278][T23026] loop3: detected capacity change from 0 to 128 06:15:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x0, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:58 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0xfffffffffffffffa}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x0, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:59 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) (async, rerun: 64) r2 = socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 64) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) (rerun: 64) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000e40)=@newtfilter={0x1cd4, 0x2c, 0x8, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0xfff3, 0xf}, {0x3, 0xd}, {0x0, 0xfff2}}, [@TCA_RATE={0x6, 0x5, {0x9b}}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @TCA_RATE={0x6, 0x5, {0x40, 0xc5}}, @TCA_RATE={0x6, 0x5, {0x2}}, @TCA_RATE={0x6, 0x5, {0x0, 0x81}}, @filter_kind_options=@f_rsvp6={{0xa}, {0x1c7c, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x81, 0x6, 0x1ff}, {0x120c5238, 0x3c, 0x7ff}, 0x5c, 0x2, 0x29}}, @TCA_RSVP_POLICE={0x464, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3f}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffffffe1, 0x3, 0x5, 0x3, 0x7, {0x1, 0x2, 0x101, 0x76, 0x15, 0x81}, {0x4, 0x0, 0xcb39, 0x179, 0x9af, 0xd1de}, 0x9, 0x400, 0xfff}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7bc}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x771, 0x4, 0x0, 0xf7e, 0xffff8001, 0x7621, 0x8, 0xffffffe1, 0x1, 0xff, 0x80, 0x200, 0x7f, 0x1, 0x40, 0xffffffff, 0xe6, 0x32, 0xffff6773, 0x3, 0x6, 0x7ff, 0x7, 0xfffff174, 0x8, 0x5, 0x8, 0x1, 0x7, 0x2, 0x6, 0x56dc540e, 0xfbae, 0x1, 0x7f, 0x5, 0x2, 0x9, 0xffffffff, 0x200, 0x8, 0x6, 0xfff, 0x7fffffff, 0x2, 0xfffffff9, 0x4, 0x1, 0x80000000, 0x0, 0xfffffffe, 0x8, 0x1, 0x3c5be320, 0x3f, 0x400, 0x5, 0xd7, 0x1, 0x1ff, 0x7ff, 0x6, 0x1, 0x1c00, 0x80000001, 0x7ff, 0x2, 0x0, 0x9, 0x2, 0x4, 0x5275, 0x49, 0x0, 0x1000, 0x7, 0x10001, 0x100, 0x4, 0xfe, 0x1ff, 0x4, 0x0, 0x3, 0x3, 0x65b8, 0x1, 0x0, 0xe630, 0x9, 0xc00000, 0x62, 0x1, 0x4, 0x7ff, 0xffffffff, 0x4, 0x80000000, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x9, 0x74f, 0x7a260b21, 0x40, 0x400, 0x0, 0x8, 0x81, 0x0, 0x10001, 0x2, 0x80000001, 0x1, 0x6, 0xe2e, 0x10000, 0xfffffffb, 0x81, 0x6, 0x200, 0x4, 0x45, 0x0, 0xcc, 0x80, 0xffffffff, 0x1, 0x71, 0x9, 0x6, 0x6, 0xc, 0x40de, 0x0, 0x1ff, 0x6, 0xee71, 0x3e08, 0xf0a7, 0x7, 0x7, 0xfffffa68, 0xfffff800, 0x5, 0x400, 0x8, 0xfffffffc, 0x1, 0xac93, 0x5, 0x101, 0x531, 0xfffff847, 0x3, 0x6, 0x87, 0x77b3, 0x6a, 0xffffff93, 0xa473, 0x9, 0x8000, 0x7f, 0x7, 0x4, 0x10001, 0x100, 0x8, 0x3ff, 0x7fffffff, 0x80000000, 0x80, 0x8, 0x80, 0x9, 0x40, 0x0, 0xffffffff, 0xa0, 0x200, 0x6, 0x5, 0x63, 0x8, 0x5, 0xffffffff, 0x3, 0x7fffffff, 0x69, 0x80000000, 0xc58, 0x8, 0x6, 0x5, 0x0, 0x200, 0x5, 0x140, 0x2, 0x0, 0x80000000, 0x4, 0x8000, 0x9, 0x2, 0x7f, 0x9, 0x4, 0x3, 0x0, 0x401, 0x2, 0xe8, 0x1, 0x2, 0x1000, 0x0, 0x706, 0x4, 0x7fff, 0x10001, 0x3, 0x9, 0x9, 0xfffffffd, 0x80000001, 0x9, 0xfffffff9, 0x7, 0x1, 0xffffff00, 0x455, 0x7, 0x1, 0x1665, 0x2, 0x40, 0x7fff, 0x3f, 0x8000, 0xffff, 0x0, 0xffff, 0x8, 0x86f9, 0x1000, 0xa6, 0x4, 0x5, 0xffffff00, 0x2, 0x80000001, 0x9]}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x1a, 0xfff1}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xa, 0x6}}, @TCA_RSVP_ACT={0x17e4, 0x6, [@m_simple={0x130, 0x10, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x20, 0x3, 0x0, 0x3, 0xd9}}, @TCA_DEF_DATA={0xd, 0x3, '(-)\\\x84--)\x00'}]}, {0xd9, 0x6, "341b2df5f01d4c7900d2a9a0151e120c1baf715555c9b851447268ed8869cde57b7c8b716b02be319545aecbea18eb175f89611b8c3fbff3a1d9e28258f40fbf6a31fd0d4e6c5f7f955823531f1c36c7fd0d956131f0166cc17426ec065b30670083f009c5028c6308a98f3468e83861591bd0a8568cf5ef29b742ee16eaaa4299af37e9d3d18c31426d0d81d49adf52b47c082e22442ce428c17dd2dfe67a74a6c3065284ae56320af86ed5071bd563780b04bdb934e43f2c455d42f0a546e40b608b7c0cb43bad8646c3ea5f4be761362a886412"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0x2dc, 0x2, 0x0, 0x0, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x94, 0x6, {0xffff, 'nat\x00', 0x5, 0x7, "2e661bfdd84012e9aa085f8583bea96e73b3b572051155bc9cf2fcc135d53fd81a1e63cbc7ee9688357e8a31824d90b512c3fd3c1d4e87a411d69662d99eaa6f451ddf13ae1a0bc64c0745e58d9082d02b90d32245235f0ef5319b5c5c25952227ac73b432fd5783a928"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x102, 0x6, {0x0, 'mangle\x00', 0x0, 0x0, "e2f502edfa32faca657169cb5ab3e36b3ac26002a954d22f6cc4a4412e45863bf50a763c6d2f5977e7026437ebad35e8f6679213c0aea1105a6b8059f61084fa4924bb66da979df809c4fbc77f77b95b5519949502f049d1be31f37c6629a65eab91cbbe44eda47e45ec5bf5e5ffd197dafe23d252cad6eb311e809cedc61c45e1863c2e668977d6a3d50077db78cd6d1b003983c93b9250ebd7442a2f42b96f59347f18428035d5e9ecf550a002ca089026cd6e98d6ec00f80a170241f8a4c8afd3c59d3b0efd60271ade6fed1c63f799ac324280e59dda"}}, @TCA_IPT_TARG={0x66, 0x6, {0xfff, 'raw\x00', 0x64, 0x0, "51f92b9736b527797eed0373ca476a27d00869451c183d3d73608edfe0a0df03984e2c23103626e58fb7610e13d33a45500c6e575f92756d3375962e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}]}, {0x9c, 0x6, "e02b9016c9fc94802d429dd98ddbcaaa644dfda0c495fcdbcadc318578995e5e34d0fbdc9be7879ea004c82a61526e457cc2239ccf7cfd2189bd7231b938d6a4177be65eae4f5e7f1298b76543864c1103a617b1c49278f2b1603ad02f3a182961374078ee368a36b16265267d933d16a74893dc6b64bf4a8d04b6d11abadaa453739320e7b226ab777c30c6945a94ca257719022cb938e7"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_pedit={0x140, 0xf, 0x0, 0x0, {{0xa}, {0x98, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x3c, 0x5, 0x0, 0x1, [{0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}]}, @TCA_PEDIT_KEYS_EX={0x58, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}]}, {0x7f, 0x6, "de7f5cf5e355e28ca73a9bc13813512059083d907960acb61a8c717e52976672b28811dc95fcccb35a77d9acacb34768b6300f8a147388a05f9cdfbc23da8be8218943d685757d34072d14470fea33fdb1473ac951fe3d6a1d88af25c7da5700d63b3641f0d45c7a48b9198ce53a54eb53ae7c407a064e77611d3d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_simple={0x1058, 0x18, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x7, 0x5, 0x7, 0x8}}, @TCA_DEF_DATA={0xf, 0x3, '[[\x1a^:$!-).\x00'}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_skbedit={0x70, 0x20, 0x0, 0x0, {{0xc}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x9}]}, {0x3a, 0x6, "5c74ccf48299a9f5d715f66c4b032aabf33db38c58a60df55696dc482207cf95c5c8aa99c422ce694325a1f4a8713a0455faa68890c1"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_bpf={0xb0, 0x14, 0x0, 0x0, {{0x8}, {0x84, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x80, 0x3, 0x2, 0x7}, {0x1, 0x7f, 0xff, 0x5c3}, {0xc1, 0x1, 0x5, 0x6}, {0x3, 0x3, 0x6, 0x9}, {0x4e3c, 0x80, 0x9, 0x1}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x1, 0x5, 0x20, 0x30}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7, 0x8, 0x5, 0x80000000, 0x80000000}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x1}]}, {0x6, 0x6, "1d20"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_connmark={0x11c, 0x1e, 0x0, 0x0, {{0xd}, {0xac, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xe56, 0x0, 0x2, 0xfffffffe, 0x5}, 0x200}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0xa780, 0x10000000, 0x2, 0xf0}, 0xfff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x87, 0x1000, 0x0, 0x9, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x1, 0x3, 0x2, 0x7}, 0xfffd}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x80000001, 0xffffffffffffffff, 0x7, 0xffff}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffc0, 0xffffffc4, 0x8, 0x9e, 0x7}, 0x7}}]}, {0x43, 0x6, "c64a1011b5d8cc59a9763c771be0e4aedd68810e56994cbdfa3be0137484348ac596c118ff88e73c7919903f5f7d6977336eb29c660f30d1e68045b982d268"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x1cd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 64) openat$cgroup_ro(r3, &(0x7f00000001c0)='blkio.bfq.empty_time\x00', 0x0, 0x0) (rerun: 64) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async, rerun: 64) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) (rerun: 64) 06:15:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x10000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x0, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 514.630007][T23038] loop1: detected capacity change from 0 to 128 06:15:59 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7f) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="340000001000090400"/20, @ANYRES32=r4, @ANYBLOB="1bd68f0500c878a984673f1890dffb000000140012800a000100dfba"], 0x34}}, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x4, 0x0, 0x4, {0xa, 0x4e24, 0xeb50, @mcast1, 0x8000}}}, 0x3a) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 06:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0x0, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x2010050, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES16=r0, @ANYRES64, @ANYRESHEX=r0], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) (async) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) (async) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:15:59 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0xfffffffffffffffa}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0x0, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:15:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) [ 514.939668][T23052] loop3: detected capacity change from 0 to 128 06:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0x0, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 514.984508][T23061] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 514.997979][T23062] loop4: detected capacity change from 0 to 128 06:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x0, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:00 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0xfffffffffffffffa}) (async) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0xfffffffffffffffa}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x2010050, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES16=r0, @ANYRES64, @ANYRESHEX=r0], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async, rerun: 32) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (rerun: 32) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x20000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 515.572522][T23080] loop3: detected capacity change from 0 to 128 06:16:00 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x0, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 515.699188][T23085] loop1: detected capacity change from 0 to 128 06:16:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = syz_open_dev$usbmon(&(0x7f0000000000), 0xffffffffffff599b, 0x6181) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000000280)={0x7510, 0x8535620, 0xfffff2b2, 0x3c03d88b}) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:00 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x0, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 515.887114][T23089] loop3: detected capacity change from 0 to 128 06:16:00 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) ioctl(r0, 0x5d58, &(0x7f0000000000)="319747caf3f123a6cfa15a9ae2bcf6cda5d71cc2e6e77c28f4d56cc8755b3738d0cb4207eabbfd4787fd51366fabb570c41ee3e6c009c7e609f6df2fb8136a99623c6ed4ee1021b5ebe946f7a061c67994398439c131f7c8562451a487381daaabb09e9fdbb8943c59efc4f192ab32303ac96c176d304720ed") syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:16:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0xd0000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) [ 516.635416][T23105] loop4: detected capacity change from 0 to 128 [ 516.662637][T23107] loop1: detected capacity change from 0 to 128 06:16:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async, rerun: 32) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (rerun: 32) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = syz_open_dev$usbmon(&(0x7f0000000000), 0xffffffffffff599b, 0x6181) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000000280)={0x7510, 0x8535620, 0xfffff2b2, 0x3c03d88b}) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:01 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) ioctl(r0, 0x5d58, &(0x7f0000000000)="319747caf3f123a6cfa15a9ae2bcf6cda5d71cc2e6e77c28f4d56cc8755b3738d0cb4207eabbfd4787fd51366fabb570c41ee3e6c009c7e609f6df2fb8136a99623c6ed4ee1021b5ebe946f7a061c67994398439c131f7c8562451a487381daaabb09e9fdbb8943c59efc4f192ab32303ac96c176d304720ed") (async) ioctl(r0, 0x5d58, &(0x7f0000000000)="319747caf3f123a6cfa15a9ae2bcf6cda5d71cc2e6e77c28f4d56cc8755b3738d0cb4207eabbfd4787fd51366fabb570c41ee3e6c009c7e609f6df2fb8136a99623c6ed4ee1021b5ebe946f7a061c67994398439c131f7c8562451a487381daaabb09e9fdbb8943c59efc4f192ab32303ac96c176d304720ed") syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = syz_open_dev$usbmon(&(0x7f0000000000), 0xffffffffffff599b, 0x6181) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000000280)={0x7510, 0x8535620, 0xfffff2b2, 0x3c03d88b}) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 516.830149][T23112] loop3: detected capacity change from 0 to 128 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0xb8, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:01 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r6) r8 = syz_open_procfs$namespace(r4, &(0x7f0000000340)='ns/mnt\x00') sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r8}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4800) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000380), 0x1040c) r10 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0xb8, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 517.048590][T23131] loop3: detected capacity change from 0 to 128 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0xb8, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:01 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) ioctl(r0, 0x5d58, &(0x7f0000000000)="319747caf3f123a6cfa15a9ae2bcf6cda5d71cc2e6e77c28f4d56cc8755b3738d0cb4207eabbfd4787fd51366fabb570c41ee3e6c009c7e609f6df2fb8136a99623c6ed4ee1021b5ebe946f7a061c67994398439c131f7c8562451a487381daaabb09e9fdbb8943c59efc4f192ab32303ac96c176d304720ed") (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:01 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) (async) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) (async) r3 = openat$cgroup_procs(r2, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) (async) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r6) r8 = syz_open_procfs$namespace(r4, &(0x7f0000000340)='ns/mnt\x00') sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r8}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4800) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) (async) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000380), 0x1040c) (async) write$cgroup_int(r9, &(0x7f0000000380), 0x1040c) r10 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x0, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 517.383885][T23141] loop3: detected capacity change from 0 to 128 06:16:02 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7f) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="340000001000090400"/20, @ANYRES32=r4, @ANYBLOB="1bd68f0500c878a984673f1890dffb000000140012800a000100dfba"], 0x34}}, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x4, 0x0, 0x4, {0xa, 0x4e24, 0xeb50, @mcast1, 0x8000}}}, 0x3a) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) 06:16:02 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7f) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="340000001000090400"/20, @ANYRES32=r4, @ANYBLOB="1bd68f0500c878a984673f1890dffb000000140012800a000100dfba"], 0x34}}, 0x0) (async) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x4, 0x0, 0x4, {0xa, 0x4e24, 0xeb50, @mcast1, 0x8000}}}, 0x3a) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 06:16:02 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4}, 0x7661, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xa4b, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x100800) r3 = dup3(r2, r0, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f00000000c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000100)=0x2c) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) r4 = accept4$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async, rerun: 32) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async, rerun: 32) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) (async) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r6) (async) r8 = syz_open_procfs$namespace(r4, &(0x7f0000000340)='ns/mnt\x00') sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r8}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4800) (async) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000380), 0x1040c) (async) r10 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x0, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x100000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:16:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) statx(r5, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x40, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000b00)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f0000000b80)=0xc) getgroups(0x5, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0]) sendmsg$unix(r3, &(0x7f0000000c80)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000000)="5f8d4bc449cfc6073f80c2c6235e13da388c4b7127ea453264d2fdb4bf4c4fb3377c303f4e67e93f8a62293741d7ee", 0x2f}, {&(0x7f00000003c0)="6fa222c663ab1ceddd58e7734a9c12aa9af904cd2b28b4749b0b6d5dfe3ece84a568bcebfc4a6731400c96d23a58a82581b0f995025dd727f182032e787227a079f9eb", 0x43}, {&(0x7f0000000280)="0e556d784dba9e2190", 0x9}, {&(0x7f0000000440)="d96a04766f1bdc186e2144c64f65690f96e546580b009874ed97b8e01e9220d79ef57e691fbf658112b5e8fee88d4f7f85ae99f2c1b57e947ea6afe124110a7eaf41d83b4f2a7a317ec109bd4e9cc7691118235b38d7b6d1da21b99efc50e72a51f4daa1cfb8b96aabbe78ec8df89f1b539ca643b2b40da09009e0b3373d756d12fa72bdb234aa23da5cfe636cb3fd2290f651791e610f4e8ba1c938ddee62fae257866a2db21ff7223859700f97ba65e1e3e7f20c8ffc1aa4417d272e3f7ec0419872d0460d12c59b894e1f47a7158689852b46b790c9989ccd7bb1b98a3a3435eb4864dca8329ff510def81d5801487e28773687", 0xf5}], 0x4, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r2, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {r2, r9, r10}}}, @rights={{0x14, 0x1, 0x1, [r5]}}], 0x78, 0x4085}, 0x40014) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r11 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000aca000/0x4000)=nil, 0x4000, 0x9, 0x4000010, r0, 0x8c103000) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 517.683842][T23168] loop1: detected capacity change from 0 to 128 [ 517.695312][T23166] loop3: detected capacity change from 0 to 128 06:16:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x0, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 517.768144][ T3413] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 517.793527][T23177] loop3: detected capacity change from 0 to 128 06:16:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 518.033174][ T27] audit: type=1400 audit(1705385762.628:435): avc: denied { map } for pid=23175 comm="syz-executor.3" path="/root/syzkaller-testdir733359034/syzkaller.67l4pM/573/file0/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 06:16:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:16:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) (async) [ 518.281035][T23186] loop4: detected capacity change from 0 to 128 06:16:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:03 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4}, 0x7661, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xa4b, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4}, 0x7661, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xa4b, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x100800) r3 = dup3(r2, r0, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f00000000c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000100)=0x2c) (async) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f00000000c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000100)=0x2c) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) (async) pipe2$watch_queue(0x0, 0x80) r4 = accept4$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x200000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:16:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async, rerun: 64) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async, rerun: 32) r2 = getpid() (rerun: 32) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async, rerun: 32) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) statx(r5, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x40, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000b00)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f0000000b80)=0xc) getgroups(0x5, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0]) sendmsg$unix(r3, &(0x7f0000000c80)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000000)="5f8d4bc449cfc6073f80c2c6235e13da388c4b7127ea453264d2fdb4bf4c4fb3377c303f4e67e93f8a62293741d7ee", 0x2f}, {&(0x7f00000003c0)="6fa222c663ab1ceddd58e7734a9c12aa9af904cd2b28b4749b0b6d5dfe3ece84a568bcebfc4a6731400c96d23a58a82581b0f995025dd727f182032e787227a079f9eb", 0x43}, {&(0x7f0000000280)="0e556d784dba9e2190", 0x9}, {&(0x7f0000000440)="d96a04766f1bdc186e2144c64f65690f96e546580b009874ed97b8e01e9220d79ef57e691fbf658112b5e8fee88d4f7f85ae99f2c1b57e947ea6afe124110a7eaf41d83b4f2a7a317ec109bd4e9cc7691118235b38d7b6d1da21b99efc50e72a51f4daa1cfb8b96aabbe78ec8df89f1b539ca643b2b40da09009e0b3373d756d12fa72bdb234aa23da5cfe636cb3fd2290f651791e610f4e8ba1c938ddee62fae257866a2db21ff7223859700f97ba65e1e3e7f20c8ffc1aa4417d272e3f7ec0419872d0460d12c59b894e1f47a7158689852b46b790c9989ccd7bb1b98a3a3435eb4864dca8329ff510def81d5801487e28773687", 0xf5}], 0x4, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r2, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {r2, r9, r10}}}, @rights={{0x14, 0x1, 0x1, [r5]}}], 0x78, 0x4085}, 0x40014) (async) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r11 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000aca000/0x4000)=nil, 0x4000, 0x9, 0x4000010, r0, 0x8c103000) (async) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x0, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) statx(r5, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x40, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000b00)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f0000000b80)=0xc) (async) getgroups(0x5, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0]) sendmsg$unix(r3, &(0x7f0000000c80)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000000)="5f8d4bc449cfc6073f80c2c6235e13da388c4b7127ea453264d2fdb4bf4c4fb3377c303f4e67e93f8a62293741d7ee", 0x2f}, {&(0x7f00000003c0)="6fa222c663ab1ceddd58e7734a9c12aa9af904cd2b28b4749b0b6d5dfe3ece84a568bcebfc4a6731400c96d23a58a82581b0f995025dd727f182032e787227a079f9eb", 0x43}, {&(0x7f0000000280)="0e556d784dba9e2190", 0x9}, {&(0x7f0000000440)="d96a04766f1bdc186e2144c64f65690f96e546580b009874ed97b8e01e9220d79ef57e691fbf658112b5e8fee88d4f7f85ae99f2c1b57e947ea6afe124110a7eaf41d83b4f2a7a317ec109bd4e9cc7691118235b38d7b6d1da21b99efc50e72a51f4daa1cfb8b96aabbe78ec8df89f1b539ca643b2b40da09009e0b3373d756d12fa72bdb234aa23da5cfe636cb3fd2290f651791e610f4e8ba1c938ddee62fae257866a2db21ff7223859700f97ba65e1e3e7f20c8ffc1aa4417d272e3f7ec0419872d0460d12c59b894e1f47a7158689852b46b790c9989ccd7bb1b98a3a3435eb4864dca8329ff510def81d5801487e28773687", 0xf5}], 0x4, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r2, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {r2, r9, r10}}}, @rights={{0x14, 0x1, 0x1, [r5]}}], 0x78, 0x4085}, 0x40014) (async) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r11 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000aca000/0x4000)=nil, 0x4000, 0x9, 0x4000010, r0, 0x8c103000) (async) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 518.728536][T23204] loop1: detected capacity change from 0 to 128 [ 518.831586][T23214] loop3: detected capacity change from 0 to 128 06:16:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r4, 0x9) open(&(0x7f0000000000)='./file0\x00', 0x660002, 0x8) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x0, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 518.944221][T23220] loop3: detected capacity change from 0 to 128 06:16:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x0, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:04 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4}, 0x7661, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xa4b, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 64) r2 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x100800) (rerun: 64) r3 = dup3(r2, r0, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f00000000c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000100)=0x2c) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x0) (async, rerun: 32) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) r4 = accept4$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x204000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:16:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) listxattr(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x9, 0xbd, 0x6, 0x9c, 0x0, 0x2096a6df, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb8, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x1000, 0x7fff, 0x1, 0x8, 0x6, 0x3f, 0x5, 0x0, 0xfffffff8, 0x0, 0x10000}, r2, 0xf, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 519.736928][T23238] loop1: detected capacity change from 0 to 128 06:16:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r4, 0x9) (async) fcntl$getown(r4, 0x9) open(&(0x7f0000000000)='./file0\x00', 0x660002, 0x8) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 519.877264][T23244] loop3: detected capacity change from 0 to 128 06:16:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:16:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r4, 0x9) open(&(0x7f0000000000)='./file0\x00', 0x660002, 0x8) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 520.050365][T23253] loop4: detected capacity change from 0 to 128 [ 520.099862][ T3114] ================================================================== [ 520.108001][ T3114] BUG: KCSAN: data-race in _copy_to_iter / fat_set_state [ 520.115065][ T3114] [ 520.117392][ T3114] write to 0xffff888123353041 of 1 bytes by task 23253 on cpu 0: [ 520.125198][ T3114] fat_set_state+0x16e/0x1d0 [ 520.129807][ T3114] fat_fill_super+0x2479/0x28e0 [ 520.134679][ T3114] vfat_fill_super+0x30/0x40 [ 520.139368][ T3114] mount_bdev+0x14f/0x1e0 [ 520.143708][ T3114] vfat_mount+0x31/0x40 [ 520.147867][ T3114] legacy_get_tree+0x74/0xd0 [ 520.152472][ T3114] vfs_get_tree+0x51/0x1b0 [ 520.156985][ T3114] do_new_mount+0x227/0x690 [ 520.161585][ T3114] path_mount+0x496/0xb30 [ 520.165922][ T3114] __se_sys_mount+0x27f/0x2d0 [ 520.170606][ T3114] __x64_sys_mount+0x67/0x80 [ 520.175207][ T3114] do_syscall_64+0x59/0x120 [ 520.179724][ T3114] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 520.185633][ T3114] [ 520.188043][ T3114] read to 0xffff888123353000 of 1024 bytes by task 3114 on cpu 1: [ 520.195852][ T3114] _copy_to_iter+0x126/0xb20 [ 520.200490][ T3114] copy_page_to_iter+0x171/0x2b0 [ 520.205449][ T3114] filemap_read+0x42c/0x680 [ 520.209963][ T3114] blkdev_read_iter+0x217/0x2c0 [ 520.214831][ T3114] vfs_read+0x34c/0x480 [ 520.219006][ T3114] ksys_read+0xeb/0x1a0 [ 520.223178][ T3114] __x64_sys_read+0x42/0x50 [ 520.227759][ T3114] do_syscall_64+0x59/0x120 [ 520.232273][ T3114] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 520.238183][ T3114] [ 520.240505][ T3114] Reported by Kernel Concurrency Sanitizer on: [ 520.246754][ T3114] CPU: 1 PID: 3114 Comm: udevd Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 520.255955][ T3114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 520.266016][ T3114] ================================================================== [ 520.286635][T23255] loop3: detected capacity change from 0 to 128 06:16:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4fbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) [ 520.495372][T23265] loop3: detected capacity change from 0 to 128 06:16:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x300000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:16:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (async) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) listxattr(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x9, 0xbd, 0x6, 0x9c, 0x0, 0x2096a6df, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb8, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x1000, 0x7fff, 0x1, 0x8, 0x6, 0x3f, 0x5, 0x0, 0xfffffff8, 0x0, 0x10000}, r2, 0xf, r1, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) [ 520.863466][T23277] loop1: detected capacity change from 0 to 128 06:16:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 32) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) listxattr(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x9, 0xbd, 0x6, 0x9c, 0x0, 0x2096a6df, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb8, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x1000, 0x7fff, 0x1, 0x8, 0x6, 0x3f, 0x5, 0x0, 0xfffffff8, 0x0, 0x10000}, r2, 0xf, r1, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {0xa5c}, {}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4fbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4fbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) (async) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) getpid() (async) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) (async) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (async) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) socket(0x10, 0x803, 0x0) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) 06:16:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 521.426062][T23303] loop3: detected capacity change from 0 to 128 06:16:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {0x5}, {}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4fbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x1040c) (async) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 06:16:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async, rerun: 64) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) 06:16:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x400000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:16:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 522.052607][T23339] loop1: detected capacity change from 0 to 128 06:16:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x30340d0, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES64, @ANYRESHEX], 0xf1, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) open(&(0x7f0000000000)='./file0\x00', 0x420000, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) r5 = accept$unix(r4, &(0x7f0000000400)=@abs, &(0x7f0000000340)=0x6e) connect$unix(r5, &(0x7f0000000480)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) [ 522.177080][T23347] loop3: detected capacity change from 0 to 128 06:16:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) (async) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) 06:16:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0xd00, 0x1040c) socket(0x10, 0x803, 0x0) 06:16:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) pipe2$watch_queue(0x0, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) pipe2$watch_queue(0x0, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) (async) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) (async) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f00001cf000/0x4000)=nil) (async) syz_clone(0x62264001, 0x0, 0x12, 0x0, 0x0, 0x0) (async) [ 522.245313][ T3114] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 06:16:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xffff}, {}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 522.322185][T23356] loop4: detected capacity change from 0 to 128 06:16:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) [ 522.352349][ T27] audit: type=1400 audit(1705385766.948:436): avc: denied { accept } for pid=23346 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 06:16:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) 06:16:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="574ebc0e94989fcde4c7e6c29d5b7d84ea1d3b850bb44bd48bb9519bc17acbb165391925581f91c0647c1d56315d4d044e055c5842362d6e3547a65f0d1dc45f590e08b80c1182db21b765ab93d4b3b8fd30a9415a11b2facb5efbeda5c99dab36960000d9bdcc116a308a7b3a9e3562550da7ba26451b761e0bc1c92c045eee"], 0xff, 0x2ce, &(0x7f0000000640)="$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") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x1}) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380)=0x500000000000000, 0x1040c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x2c}}, 0x0) socket(0x10, 0x803, 0x0) 06:16:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x100000000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x100}) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x140c, 0x4, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x1000, 0x6) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) syz_clone(0x62264001, 0x0, 0xe, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0xb1ff4000) 06:16:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x30340d0, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES64, @ANYRESHEX], 0xf1, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) open(&(0x7f0000000000)='./file0\x00', 0x420000, 0x2) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) (async) r5 = accept$unix(r4, &(0x7f0000000400)=@abs, &(0x7f0000000340)=0x6e) connect$unix(r5, &(0x7f0000000480)=@abs={0x0, 0x0, 0x4e20}, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000380), 0x1040c) (async) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) 06:16:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000030000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) vmsplice(r1, &(0x7f00000009c0)=[{&(0x7f0000000000)="a120aee3060e5175aa8c9eb81827b430813e84ccef991997f6975ea3c5393036f43b91afa0819c3a03bee2eb2602b5cf", 0x30}, {&(0x7f0000000540)="ade8060862fc0fa0f9235796830cc2fb6d503f00bcd4b9899127ae70fe318ae12958f7d80d5fa3030cd609268bf50f84a01feebe589c46a7795c3e084648940a1dbc8374a44b4fb3f02fffbf4bda7dd088e26756e35f99f54c96cad9", 0x5c}, {&(0x7f00000005c0)="599d9e5e520696edab2a7fadfeef210f2d4e2d71cc0939b2eebdf209ce42af6d3151843dcb70210e9093fe7b4ebc0163dfb934b0a6d5770111f4751649040d7ad6136f426b20d6b0f4a798ea8804f8cadb04eac67cb14bf6f7f682877fb5b659b22cdadb48b54270c0ac66b7b5c3faf2882a3fc6d87c814e1ff6a2dd37f3367a207b65026ccd521a597cda0ee143876d804a4c36e42b3a45657f8ca00aa5f7cf5269f9d63a044a18b6553db36e66dec213f7281c9f88bf20a966365289f802be4169d23a", 0xc4}, {&(0x7f00000006c0)="89bede80b6545fd62c3de5f27bb134ee14ca24ec2c6e525cece310cdd85be6129eec8fdfbb87e0fd2dc4deb136319c38abeb321cef77d92caa47f5e78a7ebe8700fe52b19430326025721461d195f0ec72c70444633769f0969ffc934bc632370ac31156dd9d3da52ad7e5de095c78392421a6b92b5e4d5d1c5db663402a289b01", 0x81}, {&(0x7f0000000780)="22ad2ad3240c41a8515c1e838ca56a33e42e360bf9e0d940af7058290796cc059a76a1daec76af3a572bcc9b27ec04ed32eca7cdd760755804dfe396d32822727b803d614a37db6026adf181b1e530b6cd2c91cbd009a0844255859df4898a8506999f1af3963b36a241c862810d60b4e52d73f157a4257327dfc14d9390cf795f832a19b1a1477724affaa42041d60635e6d69d5bf82c7e0c12a8cb4cb88f5e1d62628ded9b84916a125ea4f58a1391948bcf2459dbade5ba992eacd8a40f89b272849c28189834e747537710912601219362bc414eca0c3adff494f07f9d0e6bef2c787537bfeb", 0xe8}, {&(0x7f0000000880)="79df831f4f5e23e6d2af47946952aea7c8ec1450a6797639ca2da5401eba238ac1914d876ac13273ef2cc2aaa0fb57f30b2fb7241832d4504539470d4a0cb9aa0a17c488d5d3dc260e0c3dfbec05c84ddb2cbaeb803ceeee0aad919425feda56e4a7c7", 0x63}, {&(0x7f0000000900)="808eb8375da71dcb4684a276587d1a3fd1245ba7d4f46601f3a17c95ea0c1104bc4ff8cc2071167f578439222e731769a828667981e4eb4ca360106c8933acb053baa5392c074ae3f10114fe9d1be5e7786e441ea6446262374ced31cb452f68c35a31df57955acc6e5c775b4bc7c700fb6991385003c98543594e553fdb6213aa7543dd91ebd284ffc9dd35ee12dc56816a8ef9264146be6fcd095e146cca7cbe4b185c8604974738b601656e63dbd73f2113968ef9cb9aefe652", 0xbb}], 0x7, 0x0) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000fc0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e40)=@mpls_getroute={0x13c, 0x1a, 0x0, 0x70bd25, 0x25dfdbfd, {0x1c, 0x14, 0x0, 0x9, 0xfc, 0x2, 0xff, 0x2, 0x2000}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x80}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0xc3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x3}, @RTA_NEWDST={0x84, 0x13, [{0xbbb5, 0x0, 0x1}, {0x3403f}, {0xffff7, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xfff}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x34cc, 0x0, 0x1}, {0x200}, {0x9}, {0x9}, {0x2, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x1}, {0x20}, {0x401, 0x0, 0x1}, {0xaa3}, {0x40, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x3f, 0x0, 0x1}, {0x9}, {0x1, 0x0, 0x1}, {0xfff}, {0xe81}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x401, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xffff7, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x3}, {0xa9}, {0x40}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x7}, {0x4}, {}, {0x8}, {0x1}, {0x6, 0x0, 0x1}, {}, {0x5, 0x0, 0x1}, {0xfc68}, {0x10000}, {0x8000, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x9}, {0x1f, 0x0, 0x1}, {0x5}, {0xff}, {0x2}, {0x81, 0x0, 0x1}, {0x7, 0x0, 0x1}, {}, {0x5}, {0xa5c}, {0x0, 0x0, 0x1}, {0x401}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x1}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x4c091) getdents(r4, 0x0, 0x2) getdents(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sctp_probe_path\x00', r4}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = signalfd4(r2, &(0x7f0000000a80), 0x8, 0x80000) accept4$packet(r4, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40), r7) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a4, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, {@in6=@empty, 0x0, 0x32}, @in=@multicast2, {}, {0x8000000000}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x96, 0x2, {{'ecb(cipher_null)\x00'}, 0x270, "290995833d1b030d6d88f8d5542a44725729ca3ab09753eeb30b4e7de8684ff1d2f5122683fe216a6092d836c7206c2aedaf9cd634f517667b692b25d3a6ab4f22e7645a156d7ee185e4e78bd4a3"}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x0, 0x0, @in6=@dev}}]}, 0x1a4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'macsec0\x00', 0x0}) recvmmsg(r3, &(0x7f0000000d40)=[{{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/228, 0xe4}, {&(0x7f0000000c40)=""/104, 0x68}], 0x3, &(0x7f0000000d00)}, 0xffffffff}], 0x1, 0x1, &(0x7f0000000d80)) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'macvlan0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xfffffffffffffe83, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x503, 0x70bd2b, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x115, 0x819ad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}}, 0x0) [ 523.044294][ T27] audit: type=1400 audit(1705385767.638:437): avc: denied { tracepoint } for pid=23379 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 523.105595][T23382] loop1: detected capacity change from 0 to 128 [ 523.127630][ T27] audit: type=1400 audit(1705385767.728:438): avc: denied { map } for pid=23379 comm="syz-executor.5" path="socket:[70556]" dev="sockfs" ino=70556 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 523.141776][T23386] loop3: detected capacity change from 0 to 128 06:16:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x30340d0, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES64, @ANYRESHEX], 0xf1, 0x2ce, &(0x7f0000000640)="$eJzs3M9LFH8cx/G3uu6uK7p7+PL98i2iN3UpgkG3e7CEUrRQqBtZEIw6W8tOu7IzGBuhduoa/REdxKM3oTp09dKtU5duHgo6JPRjYmdnddUVk9od0+cDdN7OzNvP58OM8hrBWb/17EEx7xh505XueK90iyzKhkiqVolUa5+6RCQudV0SlWaLcr7/87tT45O3r2Wy2ZEx1dHMxMW0qg6efvnw8fKZ127/zZXB1Zispe6uf0p/WPt37f/1HxP3C44WHC2VXTV1qvzejU7Zls4UnKKhesPzTMfSQunNpIh/vOyateN5uzw7W1WzNDOQmK1YjqNmqapFq6oSEalU1bxnFkpqGIYOJAT7iS2NjZkZv4wfuHm6DRPCb7uy68avVDJmj4j07To3t9SpWQEAgMNje/7Xnfnf1xVsa3u+e57X3H+w/L8a3SP/B/m+kf9tq57/Havi/lr+d8vq1vJ/hPx/ALmt/I8jq5b/E8HPr+/JneUhvyD/AwAAAAAAAAAAAAAAAAAAAADwN9jwvKTnecnGtvERC/4lvPF12PNEe3D9j7dxDQrVuIj9dC43lxOxe+s7N6+7JUOSlG/+/RCo16NXsyND6kvJK3sh6F+Yy/X4jZm8FMQWS4YlKanW/cP1ft3e3yuJ5v60JOWf1v3plv1ROXe2qd+QpLydlrLYMuPf11v988Oql69nd/T3+ecBAAAAAHAUGLqp5fO7Yex1vN6fyYv4z9f7/31gx/N1RE5Ewl07AAAAAADHhVN9VDRt26p0sIiLSPvHqq2us+tqUcxfCHP0sItk057GS6Q7Po1I86CxYBZtGuu/5y++/LlveGnl5NfwrmB4v5MAAAAAtMdW6N/7HO9jJ2cEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx04nXiYW9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCw+BkAAP//0b8mQA==") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00