2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:27 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655dd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0xbc667227f6661905, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}]}]}, 0x20}}, 0x4004) 10:29:27 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0xffffff7f) 10:29:27 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002740400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1154.840364] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 10:29:27 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f40a5f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x24040041) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x200}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={r6, 0x92, "1dcf9b0c89e07b58b2265f1293f758a82df040502636e16a2c954863e7cac023042a38d3729025c5b041e1feef649bb205534279040f7f4114728994e39f54d804616aadadf5c1c85eec1902b416cc5f7e7df515860c3f1105b0e552f4fb2d58b20c9678b16a30ce34350de187d1c09b00005956d79ff75a1bcbe1f91b6fdeb0feaa683ca4e1ea1c9f3ac8eee0343632af56"}, &(0x7f0000000100)=0x9a) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r7 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$KVM_SET_MP_STATE(r7, 0x4004ae99, &(0x7f0000000000)=0xe) 10:29:27 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0xffffff7f00000000) 10:29:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1154.966451] squashfs: SQUASHFS error: unable to read id index table 10:29:27 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4255f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:27 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d000027a0400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1155.034849] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1155.162086] squashfs: SQUASHFS error: unable to read id index table 10:29:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:27 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655d0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x2ac, 0x0, 0x20, 0x30bd2b, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0xfd}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}]}, 0x2ac}, 0x1, 0x0, 0x0, 0x4}, 0x40000) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x800, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000280)={'security\x00', 0x2, [{}, {}]}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRESOCT, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0xffffffffffffffa0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) getpeername$tipc(r4, &(0x7f0000000300), &(0x7f0000000340)=0x10) 10:29:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1155.238367] squashfs: SQUASHFS error: unable to read id index table 10:29:27 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801000c}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x4914, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x7e}, @void, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x1600, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0x15f4, 0x4, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1000}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x9}, @NL80211_PKTPAT_PATTERN={0x9, 0x2, "539e099d29"}]}, {0x194, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xc7, 0x2, "8ba118568afc9e41d8d248331784dfec0e12fe863eea4feb117cb0538ceb6afda94a240dca9198bbde02e43cd9ccd5b0572c3ef0a6eaca154fc83ac6188b7bf51978ee36e94c2b1c0f81c7b032873215653fd726e6d5b7644bd318f74bb97dabec6ab46fc0cc4693569935ea0650cb4a6f6dbfe05cb794a5f0eb749943b7f5891142a19dde76e629900a9eb5ebc4512e0c690e64025a7b0e34a7e81cd4fbfa2b697921b0bbe10f0ba1b9656bea882c5d3bc55c75377dffd967172aedc4590df7a707ce"}, @NL80211_PKTPAT_PATTERN={0xc5, 0x2, "d9813b5a07104e1cbaf1c33ac63c842468b7c41eb4d1cc9ef05b4015e26ea74ee5f99470c42bf7aa53a7cb94e6842cd989125cc7726953d260ea0579541ac5da7391f24614aeffeaa96be540f662221e98e372bd8001c99174dcc4b0f9bd51e2b7fabc00e2155b7a210cc7e7f9afffcbc0efb23c6b4048c84bf9ceb24a8e6ce9e0ae4b50aa08a8840f8c80da63e62d6271f9aa76bc008b3c2da3edb4768438c975f9ce5127330bb67672651a0c01c9da953663377baa840041d74a51e1fedcb873"}]}, {0x8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}]}, {0x11e0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xb1, 0x2, "e30d1a6e4547ac6aeb5d6bc20944203bdd6782658d1aded1dd9ad61b21be1b5b5d341f6b7e7aa81c779bbe88c68f01c1bbc12d5c1444be835449fecba2af66969d6d05b75da8092252e62281ac6576a14c7db99a99c07435b4c328923e5945f3acae80777c8a76e5ff8a6f1cd85eee97a5f9081e1ddc1c3cde0af9a82d0f3445cdc17199409e171a27f8f6176277480a2144ac54bdafbda67a8719d919dd2c990e12b414abdaf3843e60bbffc7"}, @NL80211_PKTPAT_PATTERN={0x1004, 0x2, "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"}, @NL80211_PKTPAT_PATTERN={0xb1, 0x2, "faa26ded68c188b01929999b8ecf827b373f6f67e8a6d2fdead7609c68a59eb05bc73ecbc58be18a4eef495565923615a5c9f2fa165214815cbbb95eee35d84cb9bc14a47fd2da0f1475ce2ecbf6ca884a817d702257ac792141df77c5b0617fd4a68a1f12aa26ca1f796abdd481e61876c1a99262b58514cc6831e5ecf0e1876a57b7cbae0bc63603870ec7f7b20bccaa1dc08e0751b48bdcb52ba80c098bbf8a0913dd6a4dba1f14bfea5f78"}, @NL80211_PKTPAT_MASK={0xe, 0x1, "d5fc212bcc529ea90b30"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x400}, @NL80211_PKTPAT_MASK={0x56, 0x1, "5d221686cabc9444f34a19189a86733f49b7f14084d5b8c86c05d570db9d7830ba4b4b996c3297c070f8dc67b8c32f57d49c68eda62616a6f2e150b06969f258b90b48970a456ad37665833ee703bf126f18"}]}, {0xf4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}, @NL80211_PKTPAT_PATTERN={0xe5, 0x2, "3e99d7bf8cc52e58d36a91bead2bf7519c5a401025658cebe06e58594546fd79174edfb3363b2a1f259e72ce62130a5d70d3719ce6919f825b53b0ebc71c4aa91b10d91aaffee0a29f760ba3e9ecd6a21c0cfd50408157d0cb44f7f5b61d9cf788beb104f91182808c880c2621f4cf6dc18b81bbe8b278f34cfaf4c0b0798db3bcba05d520a468215cc1ebd7e46c4dfe854c87b17d7cfcccf01fb0d8c465546210d5e69c610f523507a43bd9fabc541d6ccd26ee1880c3f9292efbb07791a48122701bc80feafb8d4afd5ddda8802512c5fa5dd3f6df51cba38d3f32479451aa10"}]}, {0x104, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xd, 0x1, "107b2779a0d32e2c68"}, @NL80211_PKTPAT_PATTERN={0xa9, 0x2, "fa431f9a432cfba0a0faa749243237eb901118050c968581aa256dbe8d99df6c5f44b3730b822c8bcf84bd8c9697c683412376f3419fe704b7a03be75553b8c12d4250de4b49ccd8bb186fe37c77e2f8bc5589787711e8e6d665fc3a4dd0ebf5db9dd9fe91a09416235064c1dd138929322dcd03d6580c2d3d84df0926f74ebb5303f0a93e51eb32add96861d3b9d3c4bfa4222f4d333edccdaffcebc3e18b19966dbefce3"}, @NL80211_PKTPAT_PATTERN={0x3b, 0x2, "924864fdd60ca0ba4bd0ab1adb83f2629812d944cf9cede4c66671defbd577a3a35d7924d23a043c361bae95ffdb69822ffebb77a97570"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x9}]}, {0x5c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}, @NL80211_PKTPAT_PATTERN={0x47, 0x2, "5c67721fb39a77be4731e444fb11dac701b3680cff7cba00cfb01c4a5d649e79c91c421b1e4a26465d0fc333e11c60b2a84231c1660e3c0001b8dbfa2ebe8b4ce451d7"}]}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x25ec, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x368, 0x4, 0x0, 0x1, [{0xf4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xe6, 0x1, "827874ca7deda7ebe173bf09294c96c089b616fa07af245dce936b08e32f0d83af87c16cd9694418f77caedd8d635796bc7f59949fff1ca568efbd8f6213a9f5cbc2be5643596acbe07d04e5189f6150f5bde2b33328fc5fb7bd291b97a9731993eb7dcae9d8689ad5fb0eea505b7d63815add89de0d70a44d74fafb8f220f248782a53127c7d81d4dd1c52a5d7307b879b72387b01a1183568a9f7793a1ec42e25cd59f92fc381c7c78f6fb0904fd2d8dc5cb8277647326f038fa6f15c9d49c420ac833c671bc929ba8ef04fd5a6b0bc95722a85f5f7a10b9588c2980e3e352bcf2"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xff}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xc4}]}, {0x64, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x50, 0x1, "897341c305f96cb56a64f25e8c1c5a155de20dc303d9946244d388e0753e77e77fc627c9d939ff397dc24f1a7df4b6fbad79593334967eea3533153ff5cdb19ba2ec3ddc2299c595af4f87a7"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x3}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xff}]}, {0x1f8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xcf, 0x1, "fd28b53549d1e6d2ccdc7413d13f57c099852520e0840643608df81bc541cd76dd41a35c0faf69d703a143a3a65d7d8af98e15e6fbf92efcf0b87427461e92f14e28fc1386fea7f5b681ae739dc9a452a694ff69a4effc2c5f8a7992dc1ecf7e36fd222c4773d05b667afb2872fdead0ecbbc7ed306df204e8c715c796b703106531072e122eb97ea2af9658de8e0a7767a8fb7b71035e47fd218150cda2835d87fcbfea8abff3114d8b2c1dbe34b8f8014fb5c98c92dc8053b55ae1605edcec87aa081e5af3eb263782e6"}, @NL80211_PKTPAT_MASK={0xf3, 0x1, "2882f67da71f491ce7f60dbcfe68cf192f083c88aabf5e5924cfbf5496634283563b681b0fc8b1767327e36b6ae16dd0297b293ea427032de2ee1eba7f21f5344240adb2f7ae7435247331932ad4f6c0b52a8e0f9e1369570982c4de849811cf470d83da1495827665f239608911b1b2f6eecda42515c6a664d10712c4e87ccab6c2d10e94e9f85034e530cd7b53826016384cde9fea8b4e6faf00148150f6460f1a70fe0c9d2ece6d3374e096849aeafe3f1d78cfe486a6d509f8236b57960d9d4e84a7092ac283a0dc241da91181dbdacfecb46b737411d1bec35b95d54ace438f5b9379c4f06cb996f575e0dc17"}, @NL80211_PKTPAT_PATTERN={0x1d, 0x2, "bc5c63360717d396fc0c404cb0385b1e95ca0c7316175975a9"}, @NL80211_PKTPAT_MASK={0xe, 0x1, "9e5fe3bba981b774b9d3"}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x1ab8, 0x4, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}]}, {0x1388, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xbe, 0x1, "b89fb7845dbda169f35ced8f57a7c811150929d6f5205cc039b65694e5a45da419476157ee5d42623e72e9d11a461fc7aa15d00da027ecc422e93114978fbc2e8fe6a480ec0ca3f566b5d4c547b670253bec08853619d1e4e34a18478a7442e2f72d37e96c2a2068e4a1d01210d9d15e207d2800e53a17a6ccd53f1afc5016b65da5bf0ab0d4834effe14431137aeec2fcb715db4474dbb098d3fe8a649ae22a140c48f170d6ce64d42a6b67e209f35fb1c8d31e6990dc151da4"}, @NL80211_PKTPAT_MASK={0xdb, 0x1, "a7613d487bc367149d377aa3cbf4a663ec110a33a3f06b69e55d053dfa4f5af8165ab80bbd8322146f44d4feb8a60971b94e1e5c3f415a62f678dbee65978999ec53cf4a7763e553dbc32ab0084883da14a7c8397ada65c0b20f44e39c14a530e02e3932137ecb1b1f93db25543a3bc1e79c9d9cc00a6d0b13b5e611b486b000357a3f4b36decc14c74fcc1f33510ede23c329e42d9e0452699cd947f6dbe1451bfca1331446b8e44e3a549b0c68f9daf4c774456c463fb5ea5b07c24b7162e20fd37317cd895f2c6c733910220f14ff32275c81dcbf68"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}, @NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_PATTERN={0x46, 0x2, "ae8b791c32205a1b63616ee36c92a3989edbc29f77f99bc6123ce160c19bc3792e712109276eb5ff8bcc22cd91d720d857c8e89eb7e5c8ebd91f575bdfdef72fc300"}, @NL80211_PKTPAT_PATTERN={0x1004, 0x2, "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"}, @NL80211_PKTPAT_PATTERN={0xb1, 0x2, "e9ed0ebe8e3411b8909985e1c1f8eff73a005313ab24de1a864c7e2fb7be5fff77df8b3f19aeda9511eb15dd79e63e2342415f4b893044004cab2950a43b4ce1049b080692f0b8de33604b0d0de3a037cae9147c1071f22baba3f53a473c79188d049239dcf45425e37f50788982fbaa5042a259cadaa1113a2c3523e35aaca0e8340c247ba208c94f57391873ad1e458ba658cb8fd6327e7e1bf9bc6527baea33304313366b1dd8f850b5497e"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x400}, @NL80211_PKTPAT_MASK={0xd3, 0x1, "e2f16edd3c1e6d6fd116b6cbca458369e811b60ab020d448eb84615b35f8d0c3c163e336af0ef18683a5834ac911d4f94ce2b54f1cc5fc5e5f8489229a49d824e0f2716ed56ce278cb469cbe4afffbf09e63b64f544cdd42354a3c15a0ba2adc104f5ac29b6271fd91ca29ea20bdc934f7b17f9cc02b7dc89e4d7412f7e635b087df21aea315786b7d414a6d6c472c393487721b3f849513035f20e8e21a6f75e037e96c5504187d616652cc1ecb968befda41ccf5a4680ad15894b9ef0901e86f3ffb5b86cb63baf76052f048dd1e"}]}, {0x3fc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xe, 0x1, "da6454b8f82088b4aa0a"}, @NL80211_PKTPAT_MASK={0xb9, 0x1, "03a61dbac41c12937e412f0ae369ce6cd1ebe1ec44c1d61920fb35308bc31c7ee5fa729450854b65492c349759f861f2e43fbbc55ec4f90bae4f279c8b1d37d94174403801754e68414c762d24eef89f33a923d258cc827c7a381cfdc7debddf90236b7ec388fe03247b8d2591332c5648af4e686cf468c8545335d95d0f0613edf5dcc5a2139142e9374985c555c79e4216cb6f8d797f6861d2c5b8151cbcfb1ffebb0bf5b700472350acf7d24da7f6191dcc15c4"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x80000001}, @NL80211_PKTPAT_PATTERN={0xc8, 0x2, "dc6865d772eabf68b03d5b7bec9f4b4e8354ebef52205734be17e4676980cecc83e72693823cbbd15493fff7acfe1a988159b255603ba445eee0d1e80dc5a0c5050428ec74f45ca8545fffe0af4a12f50b588bab0c46c243bf5e2392b46a3164ce43d2c4713dd88a559ebe902026a8b833e0f805326140bbd49a6abb3497f5ded271175139f580681af36a58c09039f5679d0853757dba415b5a15772bfad81bd7e2732c69b7c946a406ffbfb7541c99936aef7201b8ac930105420c147a94ebd6dc797e"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x4}, @NL80211_PKTPAT_PATTERN={0xd9, 0x2, "f52520e757764bd86d218ce0dd4387c6621db0ee8ab5747c4185429905e31997f3b8912519da4b18ed92d767cc10b5dd0ea731c5ac0741481461d1907498a1ecb8bf990d4d3166410885650d5c15827a066b8b134cd5fd5c64587a6167047c0bc648422551333dd2d54964184647d1b6e02470a0bf3a58f23ff1d0f0df103be63b1258caf97525b5c651adce15a881fb33cd7801ea2b4d91b6b84ca374334c3e83ce1ff8083b444cfe11816804c61da63b98a271bd30d4de74ce10ec8f1566871b2299643a6e75cff711757b545607fa1c49827f60"}, @NL80211_PKTPAT_PATTERN={0x5d, 0x2, "173e9af2f1036f619a428d6222ecf9324ba4a2e5f8b41ca69811a4f4f4e981c8d9d858e5e28ac8a6fc8e73e57f3c00b6822c4be4ce16419c4e0b466eeb0c16455e39a9c603409a3aaeb56972530c64f0c05c8de11dbb6e46b7"}, @NL80211_PKTPAT_MASK={0xa1, 0x1, "e140d4c0787e3261dd0a22bb0e54360a3e9632872ae3d5ef081fd3a3f804841f51d59bd595ebdcd83144286891f87c631385561e05c42e17f439f89fda34ebf21679dd85f1c39951849a9fd2047dad2fab3eb5bb78a0bdaefc1833a9b28131b3f1f91c99fc6cea85edd036a94231f920391b70f81a73d1050adbca5dce4344ab0f9b008620d0fb9cd347b7ac10a6c68293b0b195198e738f16f60c8ece"}, @NL80211_PKTPAT_PATTERN={0x74, 0x2, "60af93a6288f45c22081335bdf6b8a7c0dddc4b575ac3a24982c21b30c20da04d882ddfee77de754e53e5eb01d18bdb8abcafc33c3be2664a86750d8fc90f07793e8ec218bbe568f67a0836237101e7a108c3930a95104f459707213c3b90d5aeff8d190bc27f24ab95148ae7617762b"}]}, {0xc0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xba, 0x1, "9aca8035132d985d1f09f6d660951e7c652611ff2e18229bf7098cc7bcfa9de4d27dbefc196870b5f87dc03d0e1344b8c7c7c35ae2899362006aca1731a2e01b18df7ebf20d656a8306057bc4a4999ebba0696c04d0f9f1403d8769939a53305a6897381a020ed03e1bb142b5c0e0730a38da8c455e3d23d00f46c3c92810f9e5097967273c1ec7b55a0cb590f6b324494c65d757130f15be2601e2a7a700fb138eca783dfbdc84b6192d56db57569e42b32347524a0"}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x80}, @NL80211_PKTPAT_PATTERN={0x23, 0x2, "cc28f895da785e614d78e5467e8e0435a40b1f7a9f2fcb84bb4f4fb86c0190"}]}, {0x22c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x49, 0x2, "0f5eaf3fe8aded375538973eae3bca7650f0cf108d27baa38df3a79d48f29a8002615e11677460a544e2a60409887c6b6f38d8de26dc92443b7c256df1f1376e7e58a74a8d"}, @NL80211_PKTPAT_PATTERN={0x5e, 0x2, "1ae61a65a8032fa30211946148d539edb03552221d15f2a700397e2069778fed419d6fd9586b5b23a48bf0db09bbc2a2362c81099df8d8bf25b232f9b04d24fce93c1c96a422a1dad495d6527906dc65858d4b8043d4272f398d"}, @NL80211_PKTPAT_PATTERN={0xbc, 0x2, "1eb37648b757910b2d5e46684eee6123b241aa5925c3f3d7d83c1d679db0371344ac29d642d076abc0f27b5a48e810e628cf8a35c071bb3dedaca57635c33487644f2805bdd5e945f512342dc5e9cd3ffcd38aaaef46cb5d9630b70555cc682cbd7930698b1f1336321ce6956a1eaa1ed59d5e59e334089b990dc0eb78caf29c0eed20ef2b7079f546fe89001ffbd34a46886cc08c89ea4965185686e34830d695df04b5f07bd8489f1b1e2d8eb6c1afac6295907c1f2fda"}, @NL80211_PKTPAT_PATTERN={0x7f, 0x2, "8d02a44affd25730438a051f4274f7c90cad69a7c380d986847ebe9c947da2c5b55f8709a94005b76148741d30f236bf6168b4b103dff187ac353dd500a169aba8bc809d6cca4063ab7dd76aed91c0e72c26a3d9ba0c080566311f3036bc018894942859cb1edbc6e3e1dbbaf83193fabf3f43e83ad19a97b448e8"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x36, 0x1, "a8b9424d71d0452f66ccf915857b2f06dba1d87353583f5addf034bf322dcf0494a9f7c28c720a42d111e8ab65dfb0bf35b6"}]}, {0x4}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x7b0, 0x4, 0x0, 0x1, [{0x39c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x91, 0x1, "147160cc146d4f6d6810b7f8834b342d0b3e757379110c280fdc42564bf5c1e9ca78da8753f24b49c44e2b18304d085583c74e005de72c0ce16cee406868afb2b3ba222b4a96e57fd5b88e54f17980e8b8da6f11b7f1232ff0125f63a49b2ed8b81feb2350784018be5e5eacd6e584f46a2c197b4ece16ace3202aae46d1364876a39859f1d2bf89e0320babb7"}, @NL80211_PKTPAT_MASK={0xd8, 0x1, "6ec313b3127864280bbc0f0c4078c42acbc1aa626917b38508930eb3a97fb7f6a87b607edef43c7289debe1460ee7340efaed0f9aaf6cf636c35f247eb555dfe4d1a4241cddd0d3a3339e741c142b9630c1f9b8ee5f521a6dcd0c65e603daa1d867e3bbfed35555b8027314ada6fff8c5ea16dbe8b901ec8f4d373f6625048f8c41c3c720d435155ac0ab879f917d97d714604bcfc6edb39d88602fa17b633a59800835cd768d8855d3416e273732de6239dbb400f40e908874e2853287ca65630196a8610f04eadd4527a79a0e38b25b69924b2"}, @NL80211_PKTPAT_PATTERN={0x80, 0x2, "fb211220e9f68102552d319397a6fdc7f41313ab2bdbc6dee45e92cb12fb6ba355f7fdc404a63ca4f0a516ba23bd11cbfac9831f15fd3e1687948c99fde2e6a8508dae062e23b2d46aeb682078fbfa26c300ea68e01faa5a7e3f6f65a071b05edf5f7e0b972fc18d1a9a390ea14d3ad7228407d28283a226d44f4ad2"}, @NL80211_PKTPAT_PATTERN={0xa8, 0x2, "4249d64e8c66eaba69abd9028297c8f7f15afce9616eb80c5985e99d44410e18e2b6d92011d7088e66c0c2c7823721e4c6a77fafc4be32c2ee3c4a2cf6857d0bd13971b66ea60637e9cb736fe2cf498f6d21f804b780ace83c87280e3b4dc69ed119a900c8ac68daa39b4810d5077ab66799dd736b9e69d8ee20a747312086a885de58ff9ec8a64cc18dfb31a7b93de4ec8bfa7149744d9ef280bfb0d74bd04a96daf92c"}, @NL80211_PKTPAT_MASK={0x103, 0x1, "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"}]}, {0x2e4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xc4, 0x2, "1dcaf4ee1b30290841a18c277a84520e18495b5a9a61c97d1dca2a04edc60d8346c0d8e2ea7160fbbcdc82a4e94a2fc47254c9574716426e7cecc6f3be6396f1483a53d703f6368bfbf20d7992ecdbc8e1951239635e9e292b18ff59e699a253e507ce4a677fc592e1f74cf61fb74a2a26767a22317449182c085a9134da58c8faffe3015cfba207a8d15b62d37b9e85b856e97c0ac126835e051ff886dfbba648f49e554ad2e339cfe2d682098924d928e4c1c49e98050df4e709a12004c901"}, @NL80211_PKTPAT_PATTERN={0x23, 0x2, "082f27e945857a57e8f1b7deabc4d1b42d89e674052dc48586605660c16aff"}, @NL80211_PKTPAT_PATTERN={0xd3, 0x2, "f46bb93115cb704cda6e6d2e0ca9a3023922779323e8131eb50dac30d9416bac8cff5d68c589c932ce92b67839dd491c428f1462c579b6b33348bb0811ae3d50d289cb1f0c220e6625a3776d91a2761a67907444a00ee6a16849c7d6f245c7bd118a995cc22af645431703b089eece4515254ad30bb8b41f82b433a715d8b565e2db4429c808154085cf0678251964cf753ceda89c9f518cfdccf9f26eea0cb312fc4a5cb437726f0e24ec8bf1bf2a668438f51f8ea64ca38df776dc7388ee689985dc86acecfece851df9cd333439"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xa8}, @NL80211_PKTPAT_MASK={0x35, 0x1, "7b18c9546e6663d9d1002f187bab2a3fb48cd04eb1bf99af5f4907d75c865bf31266e72b542a5c60c109fa28e4d14ba00f"}, @NL80211_PKTPAT_MASK={0xd9, 0x1, "a5390779df7e4d53d2ac053ab712a6da54b8d39e90d80fae034d9ad0036f67bf352739551ab51e2647f94940a5045521c7294f88325d6397d7d092e828e953c69209e0403e41494c2b6f02afa5d712dbb7c67014cef3d733f501cf4f59798c1ee46074400bf22a7af5c09a7858eb55140eb9e37eb0c4e002ba52a8e9c86f89e1f72bf62f0135029c08b8bf6bb21bf069a9d3140e676e5bb1007175923ca4ef8a4a73055a7786e4cda4f87113bd0024b88607ec959f078b88484f3227306cb3ba483505e28baf2b802f723ee93b243d6382df88dfd3"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}]}, {0x12c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}, @NL80211_PKTPAT_PATTERN={0xc, 0x2, "a816b9216f8a3662"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2b}, @NL80211_PKTPAT_PATTERN={0xca, 0x2, "a8cdaa9868cf7e94ac9a43d10c86d36656f4f2b0cf3c58ffe1daedd8dbcdb7c254347ea583c2ba4e138406db66de002a23530b7ed0a1fc65178bc6dbb5f49f37338c428ac3fdf35aa0a001760e4de8e54b864ee796d38deb3090c573a0ed0f5e83bff55f3714e343bfed7717ed7ae93b46bd85d4fd3ed2a208475775ec8f5f0230d4431ec7f6eb7eef069ba263c1a4ab1d03982d040bc10292d2f39bea00ad3618c38a0bd155669a34ce6176b6e465552ae3ca43441f76b5433b3b3b94ab77bcf16b24935bf0"}, @NL80211_PKTPAT_PATTERN={0x3f, 0x2, "7d08a413faf66c60e685da76ca614ed87b4ebe02a31011b0b125c9c1dd5889225894f6ebb28bc5084eb9fc54ab360e30fde21325ca3fd95678ce7a"}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xcec, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x5d0, 0x4, 0x0, 0x1, [{0xf4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x59, 0x2, "8d9a3bb7f78c889ea87a683fe964630379fdbe62d15ac663a77ba378e626cc31a3980f823f06c57a0193f3693197dfa74af2f6da01672c46b149b111f8e6dce1a40af1d78d0647d3dc1e9dba5842086aded8e02c1a"}, @NL80211_PKTPAT_PATTERN={0x89, 0x2, "7f9542a281a80ee04bea7e429b30748ac4fd1fb9eb588b797743140d5ccb7919791f36483db20b401cb3b5d8130276431f9e755c40eaa970021585a4ec5614540c505ee499df78c38fabfcd9c54fddb4dab323a4cf046e9b6e19710186e58135bb4d54b32f114ce9618b6d55f5ba6c1c60204a0fd290e3296efd277d4d53abec210e807d54"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}]}, {0x1d0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x28, 0x1, "0baf9628dc801e6d950b706d82f4fc606eb982da37095e07956343aab40129f3f030a9a8"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x40}, @NL80211_PKTPAT_MASK={0x7a, 0x1, "dd881ef68f277ec28dab32cdbc638ebed7667667ab7e2f0d4dd4478125831d8b2b293a0be951126ff52ac98a567725749c1b61c74e2d7fcbe3f5793c5ca02179cbed488ea272f7ac301d6be4549dd0bf7b806dd27cd21b720c484a5bbc4eba61db044749692015c29a09e15e2844b4e0bae3d4050815"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x6}, @NL80211_PKTPAT_MASK={0xf5, 0x1, "49226dc715c8ff34a2a759ee41f83b0421f016eeb74f46c15f0792adcdf1bf677576d389d2bbd42546dfcdeb53dbd031377eaff9c55d919387397faed9a217158945aa31d9114a9c560b341d87a5a04fe86078e89021ab0fef4a89eda1aafb9185e4dc14cfa35c2e799d253d7066c23d4957934245a82c818bc23d64ac9967b2800f1d4ab197a99c3e5ab42f6a120972f401f68c754f108eeaf31e8169fc32d02c8413f011e79b325a6852566c9e12040bc2f98cc483c405414d03ae124495c9073892e2cf5df2389f2dfae7dc7269eb068999c3ded3b67a6794a496397d14613cae69fb1a563b4136beb5e7a88d4df95a"}, @NL80211_PKTPAT_MASK={0x17, 0x1, "d336b54afcb3960271bf61581ba43f36ce4ddc"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x3}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1ff}]}, {0xb4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xa7, 0x2, "1ba00a986bd9e095ac1bc685c71541f995a5fe56511450d5f40c3ab00702959cbe249b2fb66c22daa48fcab88a0e2b01080de2d683552a9c831db79590477d09bb8a73862c314cd2398f44e0ef468f040a7b332ad3df9e6aa1a315d68c55ef89e9bbb2004454d38f8f9b9f623a290b53939fd3654f34ddac9534245f741c3e811bfa02886ac8db9df196e40e4709ecdc428a5fcaa6a8674f6dad8eed77b535eaf55e73"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xff}]}, {0x190, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x16, 0x2, "854b266f11a073def5537cfdb0e4bfe06bbb"}, @NL80211_PKTPAT_MASK={0xc8, 0x1, "534ae110e399374a6cd1fc1b6dc9694a5b29e717155e519f3f2d3c101e7c926e6e559254cd2f7e4b688b952db4a22b7d504ca01cf845ea98e4911c18256c980ff305f7a452e1d4f9f6574724a8e4ef5af5da5089d35b592a630f556928d0c93722bc151eee20008f90a1b958c9ed2db685f04a061edba445408a3b6cfe56ef4e10b7887c32eda1a71f5b0b4b190535265df05e56035c0a5d4d646701a769138f6f37c35dca16ce997ec068adeafe90353f701a4573b4379456952655d06f6466c86ebca5"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x10001}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x5a, 0x2, "ba6f0378724fa2f7dabb6c002a7fab69bc26d89fdfb00eea796d5dfa0911c17680a08b66fc77bc7830801143f45bcc9e6a9432c917aab67f23e7a4fa44f99680e0720ab74d093c2cacdf65893121fc9903561bbf6856"}, @NL80211_PKTPAT_PATTERN={0xb, 0x2, "e42c6a68e32f09"}, @NL80211_PKTPAT_MASK={0x34, 0x1, "59819801dfab725467a256c5daae84f24b3b3600e7fb87387b1aa5a5f28ee68b441bba827eb3949ff61ea5ff8941b7fb"}]}, {0x78, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x71, 0x1, "bbdb217abc73e5a4c35510644b48be8e936ab0c121e70cce37543b2290122f472fbc03eeb5a717acdf52599e1708aaffaf4e93d2f2143638a83d0e8a2138f92a923e4d53f1c8c8dfd318734cbbe518ec6e2252e242d22e65c1e647f6a12987ccc5b18c4cddc401a65aa19fa788"}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x32, 0x2, "8ffb90c51f0ea4e6322c327f837339ad4a0a8f3d3621ea9cde0d81f77944e2f85cae358a40dae574800f0ca20a81"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xfffffff7}]}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x708, 0x4, 0x0, 0x1, [{0x218, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x8a, 0x1, "3348829c6340c62d6eb7cbbb530a9b7b09570dff139de43602ef3aed53b8af0d4ab62cf6a1a6ea911d2996a808fd036850a1c575cf8c09a345dce45ae8be8fd11032648cfb91de0ee77913f96a8ace9f195b26bd077c3d72015e7d885571298ab7e1cd819961551402bc05c48e9b60cb7501893d090c8cc110014110efa7c3c6e8d2e1216c63"}, @NL80211_PKTPAT_MASK={0xcc, 0x1, "49f766540f65afaf82885472cc6d0e1f5e54e04a11d567fc25abcf153074d5851df2920fa75eae29b510e35039ce5ff3be08a04ff2f79fcdc4258bcbba0ac80ebbf872090c351c729d4dc4f7287042a0a0b59307904f02a67b3e9d775ed2a6145ff5c48117a61b9229bf932c8916cb4b851a4841f3fb0e1a444fa35701849e161a2f6ef2ad0ce8614c712a3f9accb1d4cc14801b1b94bd0a76d01614b613332e4920561aa27d7f43a057260e79c223daa19e7de4da5b58137f0bb8b682ab66167ce45893282cf1cd"}, @NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_PATTERN={0xb6, 0x2, "ce231b48a48d9a6dcc83f67f6801e37df15938925b47e6475f3ef205ac892298468fa62f2f97f318062bbbc48fa33b62bc0677e0abad1bad89a5f3ba69356f96fd7c218ad0fd44c8577030632fc39f28099f69d1ade7ccb621feab2ac13f83a43fee8e6a2ca4c58a68e6aeb14d5c20a9f9f1a6ed619718a002f3b2061c461aaa0237c75bc0f03e8dc007445b13ec71791f7dbd25f95e806fa5c4948d5b5697ed09e36ccd1f769d572d2f706dea2da32b5251"}]}, {0x1c0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x400}, @NL80211_PKTPAT_PATTERN={0xd3, 0x2, "e564ede5d7411103366bb8faa13e02f015f90c13c168b889fb3c8e228c8ce5aad84cdac9b68bcd2922767b825005befc51d0546e46e91ab16a8cdcaac8550da95b065391d8d402c150fd09dc232ee688c49d5d06704a37170e2e331d50d93846d90471f6e6fb03b0f173390c0576bc393b38f5ea86a3831e754c952093737289bc02279c9f5e4537d488f1233a28060d704626d4f986d5594d560ad721023302fbce7226c239c5210af8a6c92b9776b965d68ba9f69d581022087bdb13135113582cb5c7bcfcfd839a2910b2e64ae3"}, @NL80211_PKTPAT_MASK={0x2b, 0x1, "a3aff337824e867ae2d0c873b1e37b49b17fee663e4cb70d21dd02c6d6268c232e768b7c9522f1"}, @NL80211_PKTPAT_PATTERN={0xb1, 0x2, "e94e9f3b274e444a47f652d667a6c70ed5308577f7a40ac6bbbaa01d7c9f6773cbb327215e7d0b13e3aab5b54b79d66162a6153ca5156b1571899c955561535254f284611888a31898c40c14c638e9f6d20466a5e983dd6b91c6e799fffc9c7bb09135b96a8e31b0abb361f0305f5452c695d188998194cccf921f848174efbde35c010288dcb29d7886ee76a10a25821fa894c53338e9a3ac0d6cdfb6a17b3dc91c536187b8d63eb0426a7d49"}]}, {0x32c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xfffffff7}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x3f}, @NL80211_PKTPAT_MASK={0xf7, 0x1, "bcbec06cc1e1d1a88225316c1a98a6313cb64728dcba7b2b3256664e1c4122b85727ca9c7f95af8ea50bf10392a52cda213ac5a28c2ebdd43e708b96357586c9de80e3ae7414a09c54bc8141f947810e5112c7a53388151a8b9964681d294378df9a7cfd0f0d375f408377f56a14f64f77d42be8d00491d313ff694841bd67f9fae5db4841dae3d421609b569b7df8d2deede4ac9dd6dbaa4577a91fef95663305e98a14f5a98e72f9ee4266cbc0d33840479b09ab2f1c7c209eb2bcf70f4e2098de81d245442c29451cb4f3688e4840dbfb1ffc107914f87d96878336f280cf3c52687b3ed94439678b7995e70a5c011ba3c3"}, @NL80211_PKTPAT_PATTERN={0x64, 0x2, "2f1fb55cf35e8dc3b4946aa1c75788ebf2a5b5e00800a2662e487c6ee87e7007c85c06f50cbce05a43c4b86f038e75b107afb4a5261844ba8a2ac56bf2bc71c86b2cfcfb396e587198f32b7918d8b4729780ad9eb05199dd2f943bda29dc5c98"}, @NL80211_PKTPAT_MASK={0xfd, 0x1, "675935272ab02e573cbd3b8d9cea6cafbd5bb063efaef3898111bf71dd34b6cc047154d6f1bff691b501898be5de64ae864591b9edf52b28830f48afdfa0e2734aa84694abba720761213c1cb3e6aa5007518289f187c15cb694586b4d79ae6a89ed8bc0726b0ed531b9c6b41dd16899ebb5ed40d4259a37b18a5ea5580b01525454a23408f3e37d7a9e661a64efc7b967693b4f05f6ef6a79f3d119ab4692bebdf14c021875e451237cfab1b3812c867e11452983288523588b73ce5753588eee1807386dff8e9012363a0046a9a21928bf11e540f5381fe2d638c086f3566882c103a474217857e8e08c54e64e838667b3a102c5977b5f46"}, @NL80211_PKTPAT_MASK={0xb1, 0x1, "a40d589e9c551dacd25e81cabe5ab5113b351ea15d03e42c598a93248aa9dd0d2407e5254ce2845e812f8c02c304836190ee3e37f763207dcbcf258c1fc05b642e8d0728402d0196c77d3f918aa82621f1c45d6fecc734cf8c92fa86a53add2a2330a1cd8099febf209c390c4dd56270fde15d18749076fde2e831220ff6da396194d1913682ae096f581226b540d503d33142384fd1dfce8dc3f2478609fa55fbbe51f35045ae846264673538"}, @NL80211_PKTPAT_MASK={0x8, 0x1, "8c55ad47"}]}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}]}]}, 0x4914}, 0x1, 0x0, 0x0, 0x4810}, 0x40001) 10:29:27 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:27 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000180)=0x8) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1155.418941] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 5.0 filesystem 10:29:27 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0200ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:27 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x0, 0x7f, 0x4}) get_mempolicy(0x0, &(0x7f0000000000), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x3) 10:29:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1155.470114] squashfs: SQUASHFS error: Please update your kernel [ 1155.549869] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 5.0 filesystem [ 1155.610789] squashfs: SQUASHFS error: Please update your kernel 10:29:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:28 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000280)="10950bfc8d4f0b3ca01b0b3d9c1dd926ded035192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c34089679e359cc0673a10b9243d830d0f651df920febb8d441d04a9ab9ffbe3df2b902863262707cf8313d66a63abe71adfe0bbc9c641b56ddf260cf7faef5b21f894af9849a9df68b0c49cd88228fa78de77ee004bd2e8c8841315cabea828b2e746f36340a348707b2e472bc08ed5a88c0a7258a7e2badd78c7ea1c1055522484e", 0xab, 0x4008080, &(0x7f00000000c0)={0xa, 0xe24, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$addseals(r1, 0x409, 0xc) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:28 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0300ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf4) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$sock_ifreq(r1, 0x89a7, &(0x7f0000000000)={'veth1_virt_wifi\x00', @ifru_flags}) 10:29:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x1f0, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1dc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xb7, 0x3, "040fc62feaf85c0c72045d995840aaef29d04d439586de18ce8246a96fb3f54f17393c45bc68413bf028833b04794de9637c856c3d1bed8cc814f70fd0d37d161b0c67df18c2a7790912236bad51603c90f6ab270754ca0a7eec6084a3d65b31d455c86508c78ee665f993246b4c16a8381c291a12d5336c1f6227913438f1c5a3be80ec04974c4cf5c329aec1a4fa12f6d8fffdd2ea05a3e5d73866eab348a2a0dcbbace875fb6708a668859113921105fe6b"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd74}, @TIPC_NLA_NODE_ID={0x1a, 0x3, "5ae72fe129bead9a3edf470260cf32567ba5e249514a"}, @TIPC_NLA_NODE_ID={0xa9, 0x3, "1afd65c9a9deed05dc89d7defdf471184a06304bfb1d93b571b166b8b24f5f31a09b0ed6a0de2ea5ef893625b70f7cd190ba6c85448762b07052df7227a37b279cbe069a39731c71dc7c432ea0ff833d38f12b589ddd5241a8ba5a995ef209faf1b7078ef8b1e9672e249bbf8c0240da84eab4f6a3d0ffa06a6a27d0d12ce62a9f2ef422c0d4e3b099cad7ffb616f331c425abd281de61ab6efb5877c659a29e9c202581cf"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "b55581f38508f4e6c3b39739a4431a4bbb8789ad4684"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x4}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:28 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e23, 0xff, @loopback, 0x401}, {0xa, 0x4e23, 0x7fffffff, @mcast2, 0xbef7}, 0x200, [0xa09, 0x1508e5ed, 0x3ff, 0x101, 0x7, 0xdc29cbb, 0xfffffff8, 0x9]}, 0x5c) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:28 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0400ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000001502000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x36b5) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:28 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendto$phonet(r1, &(0x7f0000000280)="4c2ca35a2ef81b875a8062b0e0e146f8734ee5f5359cbb033e247a166002ec508b4142e653579dd1589f0c0baf1cdde88887f3d5933cd99ae246c00c5b1fbb50a5c022c39f920c84882e1741285b20d7650fb86dc15c98458b98c8a76a082e0ace28d2d1d9fd57a29a14f288285f07291905848db51a1a88d68f32261a742eb1e2a9fffaddea232d62cc53af91fb116dae3cb8ae5178a7cdd47a711a9db8c1f157b89c5a9da6fd7053b0d56261fa6849b315e41da7ab676123f55c8027e6dedfc5ef012b40c1955e89f3cb7d1f16097f239a", 0xd2, 0x10, &(0x7f0000000000)={0x23, 0x7, 0x6, 0x1}, 0x10) [ 1155.915773] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 6.0 filesystem [ 1155.953796] squashfs: SQUASHFS error: Please update your kernel 10:29:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) r1 = epoll_create(0x6) r2 = fcntl$dupfd(r0, 0xd6a78dd51442ec4b, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:28 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0500ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1156.062397] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 6.0 filesystem [ 1156.097623] squashfs: SQUASHFS error: Please update your kernel 10:29:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:28 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x1) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:28 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0600ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:28 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0700ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x111000, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x4, 0xbad, 0x400, 0xffffffffffffffff}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:28 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0800ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendfile(r2, r3, &(0x7f0000000080)=0x9, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$search(0xa, 0x0, &(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x3}, 0xfffffffffffffffc) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:28 executing program 3: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {r1, r2/1000+10000}}) r3 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_free(r3) r4 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r4, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r4, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1156.415825] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 7.0 filesystem 10:29:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1156.461288] squashfs: SQUASHFS error: Please update your kernel 10:29:29 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0900ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1156.549065] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 7.0 filesystem [ 1156.595054] squashfs: SQUASHFS error: Please update your kernel 10:29:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000140)={0x7, 0x5, 0x2, 0xc4a, 0x0, [0x7fffffff, 0x0, 0x6, 0x1]}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x24200, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000008000000"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="b804334a", @ANYRES16=r5, @ANYBLOB="040025bd7000fbdbdf25140000000800110001000000"], 0x1c}}, 0x4004800) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil}) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r6, 0x0, 0x29, &(0x7f0000000000)=""/231, &(0x7f0000000100)=0xe7) 10:29:29 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:29 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0a00ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d0000200040000002601000000000006b002000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1156.901521] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 10.0 filesystem 10:29:29 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0f00ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1156.964822] squashfs: SQUASHFS error: Please update your kernel 10:29:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x1) 10:29:29 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f1000ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1157.073591] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 10.0 filesystem [ 1157.121255] squashfs: SQUASHFS error: Please update your kernel 10:29:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400209) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:29 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f1300ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:29 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:29 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x5, 0x200) sendto$inet6(r1, &(0x7f0000000180)="91b72b4ad5b5da306ecee837db6bfe71dce4325104e572a5d1a791bd83b2c23de9b2d866d7e6708d540d650dbc15a4f38e81fd6a19e4a42272619306deacc18b699a9966076e6076b4c07e383270e050d4511d32a129172331e85f0fb6bec83099c58f", 0x63, 0xc004, &(0x7f0000000280)={0xa, 0x4e20, 0x2, @ipv4={[], [], @private=0xa010100}, 0x8000}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x482403, 0x0) setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f0000000040), 0x4) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000000)={r7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={r7, @in={{0x2, 0x4e21, @private=0xa010100}}, [0x5, 0x4e1868f5, 0x100000001, 0x7, 0x7f, 0x7, 0x6, 0x5, 0x2, 0x9, 0x8, 0xc8, 0x6, 0x0, 0x9]}, &(0x7f0000000500)=0x100) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000340)={{r3, r4+60000000}, {r8, r9+10000000}}, &(0x7f0000000380)) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:29 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f1400ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1157.426273] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 11.0 filesystem [ 1157.443202] squashfs: SQUASHFS error: Please update your kernel 10:29:29 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000008000000"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x50, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40004}, 0x802) 10:29:30 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f2300ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) setrlimit(0xf, &(0x7f0000000000)={0xfffffffffffffeff, 0x200}) [ 1157.577401] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 11.0 filesystem [ 1157.591470] nla_parse: 3 callbacks suppressed [ 1157.591479] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:30 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1157.625430] squashfs: SQUASHFS error: Please update your kernel 10:29:30 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f2e00ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:30 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_STAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1411, 0x400, 0x70bd26, 0x7, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}}, 0x41) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1157.724484] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1157.784572] kauditd_printk_skb: 985 callbacks suppressed [ 1157.784584] audit: type=1326 audit(1607768970.230:176467): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=18 compat=0 ip=0x417cb7 code=0x7ffc0000 [ 1157.837263] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 17.0 filesystem [ 1157.864878] squashfs: SQUASHFS error: Please update your kernel [ 1157.878116] audit: type=1326 audit(1607768970.260:176468): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2190 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1157.913625] audit: type=1326 audit(1607768970.270:176469): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=2 compat=0 ip=0x417c51 code=0x7ffc0000 10:29:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:30 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f4400ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:30 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000280)={0x2, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0x10, &(0x7f0000000180)=0x4, 0x4) write$vga_arbiter(r2, &(0x7f0000000000)=@unlock_all='unlock all\x00', 0xb) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:30 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000000)=0xa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1157.942896] audit: type=1326 audit(1607768970.270:176470): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x45dfc7 code=0x7ffc0000 [ 1157.964002] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 17.0 filesystem [ 1157.973037] squashfs: SQUASHFS error: Please update your kernel [ 1157.999976] audit: type=1326 audit(1607768970.280:176471): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=83 compat=0 ip=0x45d577 code=0x7ffc0000 10:29:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fstat(r1, &(0x7f0000000080)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000100)=0x1d) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x400082, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r4, &(0x7f0000000200)=""/186, 0xba) r5 = accept4$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x80800) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000340)={0x8, 'veth0_to_team\x00', {'veth0_to_team\x00'}, 0x401}) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x420300, 0x0) ioctl$TCSETX(r6, 0x5433, &(0x7f00000001c0)={0xfff, 0x100, [0xfff, 0x6, 0x0, 0x8], 0x7}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 10:29:30 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f5b00ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1158.038723] audit: type=1326 audit(1607768970.280:176472): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=165 compat=0 ip=0x460baa code=0x7ffc0000 10:29:30 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:30 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:30 executing program 3: r0 = fanotify_init(0x4, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000280)="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") r1 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r1, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x400c084, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty, 0x4}, 0x1c) writev(r0, &(0x7f0000002680)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="26270c52b73fbe95ecbeed6483640b01ff01a29deb1d0feb7ac82af27144c5c4a4b15ad46fb26be5c6821636297d841fcf0dd95f084215c7ae4c62035db4e79ecf676a00873db49ff32f6b9876e34f927db2f8714d18e05786e20b5f6d01ba9b126d77188d01031303bbfca7f8fe91063998c8cf2b7f9876cc2c4949abf22b580a842b7b60ab6ee78744d947a39b988351bbf3f1fb3b333b53bc24390ddab0408dfe7a", 0xa3}, {&(0x7f00000000c0)="896a64bc8e00bc5b7fd1240b1094fdb2824756aa4590bf474648eb9d44b9f43ff7e017f9398fd17b9c5013", 0x2b}, {&(0x7f0000001440)="dc0523b1819ba58ecea2055845aa286416a278eaac901343ba46cae88c96c070ec8415cbd398609eab00ef0baa22afb1fcfd1971886b74fba1a5d16f5ec722ff046fc02c98a8f37a4f095c7e8ad5b2116c032c6f60287f602ee64f53234855f7c0520e6d871d693c47597fd00c9bb786edabd172d551a08cb0b75270015a1ab5002cad1d7b95ee835ca8b0a3e9b96d36170efc88ad7480477d14c6a6e2", 0x9d}, {&(0x7f0000001500)="55ee2e1093ce7036beb55063571e5e4adf41ff4c77397a284d63547d6a599dfcd22f0061678887670a6353bf2a9dae91d37c405bff82727b0e5c0e46239288a8e51f48d08898f436c2d394689561a58ae9ceb331b3cf800439fa5fd25d1b6ae35139e8014615fbc6973eccfa4f6debe2742e2ecbad018c301f7a8d909a1261dac8e3a6fa", 0x84}, {&(0x7f00000015c0)="226c521151c5c4056500cdfb0f0c123104cea8ad0b30b3c2a8dd311c3ea0b56583b5ad1801acb6fac501fb33c88d6a1647c1b604ba827265b95f24fab7e543d67be336bcaca7e7e064a2600b0b43b606caf4a03cdcbfee6de39342280038f1b27d2d7b5a78970eadd1f4bfc299db69f972e868a9afa48c57585327fa7750d766f28b42d96b573d6e7737c0d3f592a90499b343d41f70307e678cf409ad98d93cd8dc350223e5d55a243a86cef390d320fd4b59f5d172", 0xb6}, {&(0x7f0000001680)="aab4d3c73e0be2df7cc9f720b39aab15aae8324c8b8440ec3453dace015d30d1098244805efc182cf764526a578896ca8ec0206f45205d9e6230c11eb5425fe71ea76a8288d13a9a0bd0bb1b8f14f5df05514d0bb7efbc737eeb24355dd5590218831551b951a3f14c14f199a8756cb6e7d5123437da4436ff52fe2c91da54d6ca24acb46432f8e5eac60f4964abd67c5cd80fa647f88791c1ae1e48426857cde8b82bdfa4a454b2cbe4ace6fe6fa06ae1adb4b06cadec5423feebb940ba0eb141b5eb5a41cfe3487b45e73485579dc45b80965a9fd03894d8db96fdb3ad342fc9452e5a13fbe64cf23313e1ba27b76b135d66dffe3965ed8f2ea5047e008a5b51e7a34a887f577da6fbfddf8bdf59260aa73c813bbe525ff4426fd9bbbb1f0003d8f8c51afcbbfea185b731ec60a70f1309cebbb9d92566904be2bcc3f48469fa8f2188f7cc876701b5f0ebbb64d433635e036a04fa4d48f61a16deae17bddaff4e22d5a3ab257f461354b997036042d0ccb5c8203a56dcecabe64eb41358bdefcfd6594a33a0db74cc4c4e997dbcc805f9ef59b5f163185f7757a95bc6859e6002d27062fd1bf3e3d300e30d48cd589be3c738f1d6a9225b79f0dc99c0177e9cfeeb5465d130a2013bff97703b7f0fad747d79c45817a5ff7fff69a6ea11fde956377b9e764b1cca95883de49411d68fd55071111ac6daec2f0fd3cf280b4bae3b5e9fd0b1b69269eaa73d122cd27f1a13807fb381f140e54faba16be338ad4d041e8d58a1b1dea2cdaec616293256c1d6cd8a6e1f966f4176a427626bc734041cb66794f6b1019b926fc8911e19bfefc982b25c18cad2c1f787620eca607ee737264275e7dac912ee3bca79592d67c2319bae5ae4975ad320e15516c7d56ac5154c13c539664d413f153dd64bdde77e103f1c79a7d2030c36ea0290f864db706f7c782bf08b6fe81a93e7be51a58bf0ad0d8a5f1f7199df07095db9664be5dbb034818a95c7f5374c1398510577ff53ae32222eaa0830f500689172c4124a335929e1abbd3e016c0ec964157c676dd5f8fc7e7325070dcbe9decba53b62f98fbbb4f41665cc91bf99150d437092edf862ebca4cbd05d99054a3e8f720de1334066dc24e97ca6d85cc8331f909a7942de35ebe5d91368aba38ca62744b59fc9cef31e186546b89a255575f4f19d7da926bfbb5a1fae441304097edc81c796ba693130b32b39570cebed7124268f16b2624b86101c846ce0c81c8f685985a3040baf7b6aa16e238df8a51ceb5bed7e87394d006ecea9ff79923fbd9325bb4d876a09836e9000fd4b9fc22a666652cc83a74d9817378398289fff941fe7c2ba5d91383b135849eb7ac33c1a06019a91bb2907955bbe171b4a11d9ac7acaac366ce2a077c56cf867dfc424e010e2f8d174423b3dfd20fd59d79c4b7252a9b1bc76fa8685e7c8f19ebe0cbcceb137394fddc56f3a6cabf88280baf76afce5aee2eebe3b7519c7d60071590eb1323772f8b87b27f321b663ccaec8536291c0a0790ea645ffd34a9ad011f4276aff68522e8d1ec6143fb4c2f58b8b12927875a648516f10acc66588c4d2bd87ea91a9a9b947e2713c68d24f37bbf7a6042f67a153e6f44b11103b2a7e99cba48de1fb7ef1b070e4566d5418524af84b2b3397df3db0529fc64fd9eec3b8a08eb8df74b1aa4a1f853f44fb3d3d0cb405f3070c7e413ff60b64f684d424b70c4c9729b2be3edd675c1de95ccdf72d88e89d76735836e30fea43e8f222eb2f3b65b7113899142770e46802428d292b3e744dffa730afd87c09cdfcf5e7ebeb80cab7676d0260c757d32c77ded28f8f3e92886525e596fae11d77d3b92b4c0741e48c8b5455a42dc1e06e5fca5ad56077d225dd835c263e4b1942bef5967a8d8b5e94ca68377dd88e6e3d3223bb679eafd0d1ceb597eb1a485e177a8c7ddeff1cebf6c9719475de701bc578a6c321da1cfc076caf8add09bece9625e5791794843ab594c9d0f4222ce030fa23a3c6122671cbc2a79b38b0a39efcbbb40ca277a06e401cd1058864601df9d5fe1df1d7b21f6b4aa71b6c038b40485a8e424a18fa253a19961320a37b8c2b717af1c4ecc38ba4e0bf65c23a8ce2b6cf47805bffc2a5c3f963e1ef603010591292e19c8d6ef908dcdc86107e210452f8133fc8b8ed58dab45263c447161410f5808e007bdb14ea9f2a175001ff82f684c1ca5d52cb489899ffc7a0b002767935eac4756dd0fe6f47278ac296ce49b5db58222aa98567f308c654c06879890673ac4f7e06d90db14e7c24be785f04560623b269744b7e921907f565b07972cac3731efe99e677d8dc7864833409e5359d4ea7347ad8de2e3edfa8335821b1e05c89a217dfe7f6dc764532ef9a781cb37b8503b5ba4991613414c6285786c7cea17ea9982d8a42e6b5c31966e7751ce45f5eb2e0af5faca104e460635e84b7b91a99b60e41bf0e5491caea0a24fe8c9c669bf98b9091517da06fa116331ee3500ad799db543aede96bc8a1a2320ff66022f1669a4d1c27d88d9e76d0300360594e35404c8cced06fe73293a3ca427b0a95c9a5451cc8723e9d5d68f4c75e1d7c4352b8e7d64b58cf1be236bab0aa466f6b58d5f3a0d3981f97e03ba2337b264bf858814d691dd367aa49762d4c7237760c5b882afec180651e50dcfc065b8b8c24d8b341a806d3d3c80e9ee046cdf15673fecf16407e72f32d322c8245147844ffe81407bc5cfebbb18af5d68e717460d5f2f43fa33e8cb134adb31b7df8b54ee736ec92559b1b5016cc0fd060b59e325b2f5da8a509810c685a38e7d6f33a858b12709d0d9b5709408fc16a121d2aed9e93b14a828c64932e72bf1c37152f76c00a520bb2026d14153ba861c9d21baf04177a117bc27b0aba714106124ff9cc5e40e33e5c5c77627fa8fa8a5b804bbad7908f5946a1f8f9f60a53371f467dec85979e9208a86d52fe031fa381ba04dcb3d3bea8ba7c0f42230dd196ead10369024cf56362a9dc64ec1e00b9d337ce2e6f38114a3ac1f897ba1e0dbd4350932d069a6c040613ac2f9f35a0defb9942104dff36160ce0af6dc38faf5ef2cd37274148642cf74eddba2ab804b3409eca43ad2212bd9d24500782065b6e500777e81d25710b08a0efdb2d696c3b7a724ebb62a9a060ddd43d24581c31b059e37061a57a2de78f2cd25d84ccdd7cf1cc38c7c43256eb75dbc995d8f8c3299bc40d776740ab81328958dad86152599443d89b0bc3b01c454373a138eb53ffe88190bd2dbdbf979bbea930cdd3d8287b3f24591b1131929df90d8c56d00c590f133966549d9ed11845069ac4e0148835abe2d4788f232f336a161dc2af2952c2750a1fa45daf02e3a8657b0ad4a003a6d131265a68e7327f8a726a0352ee30cd33810c63af749e090b31dfca4db1c80fbe6b38f6abdf88cc7842497cf82a783d0905956306e71c5155afbb5ffa3a6009492c9280274c14f09f5e75aa666a382e76dac2ac2e6f8bdb608bfa50f833a7d0878d844395406fcc99160e2c0a556286f60e739425eb4877b1a80522f6fc888e4b39f45074906e6602200f9fa15f22817a1138bfe83a134874877b20decf419b0034d37a6b705ecfbf3a8d889b7cc0524992bfd1f86615b760a39a7d48bbc4a586c3fbec7b5664a11ccb018b06cbbf2bb5b4bf7b9bae3f3df5025e1c184a2e6629f0d7fa05e8215d8ce8350d840c4b9d5522a2deda8ad531a07e3b596b00e324de140e371e6f2ac56ea31fec5bdac253a0ad8f774d97439ef6fcf202fded49b108fe689cf308bb40020537ea1d84d11e7daaf0c0854de82139db305c9c9bbc2241d5b97921bfa19860a7d2c9219115310ca22eef758aaebedd043a83ab103d7feca539facd789a5dc3f846185ea5770863b4841eafa9467378b8a533dce940fbd9165c72ca3be829171f7b84d255ff45b5728b3cc49197bd33bc5ab794549fb15bcdbe5ad2a5d737987c19818c4d2f4902e84208eb6688ffbf9a67f6e4c6e74290f50559725933e9e494fba6aef905a825f879660a62e581837a5fde6873cd7b648d88e1c277141af78aeb46df31d5f273a16828a5971aaaa667c0966fdd909f65f02e769ef6d018a541b716bd6af974c59b31cbe6b5fae96e9f60e3b47455f187f9b890a8d0354cac7343d21f46ec5cfa7f52f63bc4110056acca17fe95ca7cf142237fe3b4714247479ddf75ef5e213c518a0728249349fddbb2a7793547f66232fc87d6b7fa293137079d71dbdd7100f908e97f5b81a58fa3b293da26b53573acab3fee2865cec5c235ad6e45164a017e895369d68d4dd8d27f75cf426f386257f2a288d982270ba966b111dc83169c2e69ecca5e7137c392dd01b5242da6d6973be7495b332215bdb6724c575ded4114892b34bac0e591f9c7f2a3377750e21a48edf678c8e7b1831a012d8b05379c9d4d712bd5cf88a272bbba1610cce627571bd3a8f466d9e533f05c13202fda2225d216dcb4ae40bc3fceffd272108048b177bd124b6717b4702a67bf63a01bb63775443ed80e2a4f0a8f6c1c3dbd165dd26968de5d119de88baa4e243a332f9f9420fe0ab8e621c0729108e059143c454a98a87642f9f1fd0db80e823b88e893f1aa3a2f1a56f116233a057acb9ce67f6995fbe23aab83aac78dd018ab3522d0646d307dc6499f9a061ed2492a77582fbae7ab030b6eede5ababa106e4836bda9137782d27985f2b463d01d15f5c7fbbd619276554bc453009ab2bb72c3c816b5aa5db809fcebbeacaf1835b8d5336f39d9753572cd3e8050d7eaa58927d3cc36d571d8f8e260ca40c4aae55cd4c61055af81016f31d5804bbf438073569dfce7950074a21f416645d2ad522fa72c0df377f446010ae92d5b7d67df8d81a4678b217822007dcea92045e82eb7cef04994f1937cb52e2f5a52a415eade22030c7c5fb0efff907b805a9221a2bb4d9992fbe1abfe4ead19b6377995e73d9ddd9c787068f5e713c58915df17c82d82d10d25c92530a5466f3646a05494c67288765d25fc1b0033b023064df8c75d3282674f3e440f4ff0890e737e584b1975bb3b9a9c20fcfa6555cc9a85314d65edae5aed7291e302740c99622d3beddbed05d68c4bf8882e70a3bf8f29d75526c61a03e068a8403f65e948e10685fd871d754a58cf0f129e46abcca84734decb7daef84b60fdfe701a531b60abd5c8ae8e3d88f7f37b27e982ad0ead1bda96c24ec30670a50a9528d5409d41acf673c80e7c3e55852b3ff3106308cadba89a57038fc50c1901dfae8ff9e7dbc058c1de0b47ba1d6b0451d8adb957860e4677f7ac85787e399940356c2ecebf605353a4b9efbbef1d4e774933b9ddb22777bc0945a168b4f3428cac588e0d8bbc5a0e032e3e3484790d12b188ea5fdf3c61187098d8659cf3b3e2ed1a1138deab303c6a8f2b7ca95f1ff09eb10d9038830c5edc5d390fe52423852b998426a81a6e5406f376ee759114828871866fcc0285e7a7aa54fc6fec0a1c33e7aa50386c2b610878f32149b47085a5d85f89aacf2a17a5fd9f71f8d27f40c98d2505866258a226013a570cc2e3cf78f60d077f31c9ebbd7589fae98a6ad172aed6ada860d64d598b6478b1cd5e13921393ec4c5ae2af48fb7eb517cabb9d0d3190b4e0b48031c22acfc69b7df1f9c20f5939ab86a6b595a41b9c699f6d7383ae2e0416c98fb9cd95a96c0d7eae3c5f77d273a16db282fad1c6e233e3634f813261155a1a06053eadad2c892c15420a7a02af5373ea12dcf378", 0x1000}, {&(0x7f0000000180)="f6c241e1e33d04f5273f3a73a554c54de2b273689a6ccaff", 0x18}], 0x8) setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1158.109919] audit: type=1326 audit(1607768970.320:176473): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x45dfc7 code=0x7ffc0000 10:29:30 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0003ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ff0000/0x4000)=nil, 0x7) [ 1158.211923] audit: type=1326 audit(1607768970.350:176474): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=3 compat=0 ip=0x417ab1 code=0x7ffc0000 [ 1158.215875] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 18.0 filesystem [ 1158.315296] audit: type=1326 audit(1607768970.350:176475): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=3 compat=0 ip=0x417ab1 code=0x7ffc0000 [ 1158.339216] squashfs: SQUASHFS error: Please update your kernel [ 1158.339249] audit: type=1326 audit(1607768970.350:176476): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2203 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:30 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f8103ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:30 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r2, 0x8, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x1, 0x9}}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r6}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_MAC={0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4014) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:30 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000005000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1158.461206] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 18.0 filesystem [ 1158.470770] squashfs: SQUASHFS error: Please update your kernel 10:29:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xe6b}, 0x4) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e25, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f8203ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x100000000, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="2788a18fa226c808b79cbcdd2e7cc7fbd416c1b8794ca1f8fd4c5a7ce6ba05bdbc07b6514573b79d7a75d3e0dfa3230f02e0a8057813a8c1c52658943e019ef4e0d268cf790768b4490d8bec7bdae641e7e2de8d2834e02e88c159aef7ecef5cff74ae763185439ab033fc32eb9235fb81a33a30fb8b556126baf6639f7d27cfecfcb85a9fc40f9abab9f6a75cf8", 0x8e, 0x5}, {&(0x7f00000001c0)="39f019f26cdfb71d91f709612689ddcc76921d586eeb6e9b950acdc10cb21d198675622c50c410e105ac5eceed6e708aa9e4738f5e5ae36695ec8108521f667a4872e39821c2717b249e2c5d09e2f5367eafa319a9daeeb8796603d1899f9afeb8c66b31c8f48d0ac0c125104bea14054b6fe4f3633e6ae15147dcd3ad18b6f1cc4ebb3d4061020af83fa3f8d91275a04837e4a9071b9656b0744d5243683c16a053ab753500e6cd6236514d6eaa24bd1fd800abc5d8bc80a2308023851e45ef81af0c1f4d4011106f08d4a5df289e3b016e6406f4817eab3a318e75b7c17c03536f54d2558b5e7a2c4bdd", 0xeb, 0x129f}, {&(0x7f0000000140)="08846ac97d23", 0x6, 0x3f}], 0x82040, &(0x7f0000000340)={[{')\xe1),^!'}, {'@\x17'}, {}, {'|'}, {')'}], [{@obj_user={'obj_user', 0x3d, '}+'}}, {@fowner_lt={'fowner<', r3}}]}) 10:29:31 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000006000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f8303ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1158.675588] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 19.0 filesystem [ 1158.705723] squashfs: SQUASHFS error: Please update your kernel 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f8403ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x8, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}}, 0x4000800) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1158.866604] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 19.0 filesystem 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f9303ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1158.911184] squashfs: SQUASHFS error: Please update your kernel 10:29:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ad073c", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3e83cfe6348bb35dd25c4b5e628f66dbad6675705f69643d265a2f381cdeecbbe2c8aa783c9bfb9bed0efe637daaa602e5483b7e2f6c7d6236a413d58aa9f9812173131d8df16db51a2d3bd6b110e59bad0b6ea6435f904ae04384d2914d5ee2da4a977a59faa0140517a868fd9efc00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x200400c0}, 0x24000001) 10:29:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fdc03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:31 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000040)={0x1, [0x0]}) 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fdd03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:31 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1159.220821] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 20.0 filesystem [ 1159.250189] squashfs: SQUASHFS error: Please update your kernel 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fde03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:31 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000009000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1159.385881] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 20.0 filesystem [ 1159.403759] squashfs: SQUASHFS error: Please update your kernel 10:29:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f0000000040)=0x8) 10:29:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:31 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fdf03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:31 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0xfffffffd, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e23, 0xcea2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x100000}, {0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x6, [0x4, 0x7, 0x3, 0x1, 0x0, 0x400, 0x385, 0xff]}, 0x5c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}, {&(0x7f0000000280)="3071222339abf771075dc967330825bcc7c32a07dd8547baed51291d49ac45f4986e43e334c718babf240d7357933e31e4abc62868b500703c2f53d95e15af51bb4b9298a6634806e23d4d2aa167d5e14a92a0647745d0b5a24b4e28b9b00f6873f9a98e5a71b051cf6a8aa0f6d2b25aa53fb71f7a07615069b81fbf2225bc062b178da5ffb616ba0a8bfd221431fe", 0x8f}], 0x2}, 0x0) 10:29:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fe003ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x10, 0x1) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000040)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f00000002c0)={0x8, 'veth0_macvtap\x00', {'veth0_to_team\x00'}, 0x63de}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000200)={[{0x9, 0x4, 0x80, 0x2, 0x0, 0x3, 0x40, 0x3f, 0x0, 0x5, 0x2, 0x3, 0x6}, {0x1, 0x4, 0x8, 0x5, 0x3, 0x3, 0x20, 0x3, 0x1f, 0x8, 0x86, 0x81, 0x1ff}, {0x10000, 0xd, 0x7, 0x4, 0x8, 0x5, 0x8, 0x2, 0xe8, 0xb3, 0xa7, 0x4, 0xffffffffffffff51}], 0x3ff3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000880)={0x0, 0x0, "a0989bad8b17622895a28bdfbfdb9753b4b565393769e5d448ea8cbb54c4a010b6939dc0c9132821822a7813aa053dda9a773d025af677d653df0d3354637fcffa98247451069ac98da18288b9afab7f4c92c10bd5f4ad744b1f2a6967122c713e0f2c61540045e19161f1d28014948452e4d278e91184c9841eb1568139c8ee6b7de56a55e2c3967e667e57a10c3c3337538f325e5db2230318d827162b810b96627334f37d7b7432f02f3caf66a5b11dcedce4e7fb870513979a5036799bd875ab2ea9cffdb7831497091aaf2718017978c35c20bf36301d4e167d6f23d2dacd6f6259d829e8d7bbf0fbe0ecad530501e74b8600a2f593f4ade7c93c63f208", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000001880)={{r6, 0x3, 0x7, 0x0, 0x100000000, 0xff, 0x1, 0xd4, 0x2, 0x81, 0x5, 0x9, 0x4, 0x1, 0x1ff}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9043, 0x404440) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r7, 0x40045731, &(0x7f0000000100)=0x6) write$tun(r4, &(0x7f0000000000)={@void, @void, @eth={@random="49910a147ff2", @local, @void, {@can={0xc, {{0x2, 0x1}, 0x1, 0x4, 0x0, 0x0, "f93dc73c2e9e539d"}}}}}, 0x1e) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x6b6, 0x4, 0xf0, 0x0, 0x8f4b}, 0x14) 10:29:32 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d0000200040000002601000000000b000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1159.613417] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 21.0 filesystem 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x5, &(0x7f0000000000)=[{0xde3c, 0x8000}, {0x2, 0xff}, {0x40, 0x9}, {0x3e, 0x9}, {0xa6, 0x3f}]}) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1159.664780] squashfs: SQUASHFS error: Please update your kernel 10:29:32 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1159.801571] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 21.0 filesystem [ 1159.822556] squashfs: SQUASHFS error: Please update your kernel 10:29:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ff703ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x202200, 0x20) sendto$inet6(r1, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @private2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) 10:29:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = fcntl$dupfd(r0, 0x0, r1) openat$cgroup_netprio_ifpriomap(r3, &(0x7f00000000c0)='net_prio.ifpriomap\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'wg2\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f00000045c0)=[{{&(0x7f0000000380)={0xa, 0x4e23, 0x1, @loopback, 0x7}, 0x1c, &(0x7f00000004c0)=[{&(0x7f00000003c0)="42a763af7cd99724f697109ec0373b29073d0c4334a3cd4a62a95449fba5b61de5b83e94c3a42dec70e4c248b380217be4144c884a8dfa12b2161d518ac20ce1dbb8cd59aeee638d72ee7bd1a4e497d7d2bc05b75aed260297280903134d961ba75289c06256851f09a93252a7b93686cb4bf2f66249531aa0107f788fcc6bcca36b1c5a7d1774ce87cbaa3657f1a7ad8b5a9389b769c2bf9ac3947db487e8f017fd", 0xa2}, {&(0x7f0000000480)="a95be0e24851236a57d7273a0ca1054eb88f12c689", 0x15}], 0x2, &(0x7f0000000500)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x53}}, @tclass={{0x14, 0x29, 0x43, 0xfffffffb}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x6c, 0x5, [], [@pad1, @pad1, @hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x83}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x2}, @enc_lim={0x4, 0x1, 0xf9}]}}}], 0x78}}, {{&(0x7f0000000580)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x8}, 0x1c, &(0x7f0000000a40)=[{&(0x7f00000005c0)="5e34912b97effa7f52bd194ca5105dfe3045a534ec4c1ed2a33b5f93c88202a6de095ac79e2e1b8629204c5a56c45effb0fda02b9e92b363818a6d59bf3994e06c0180bb3de872018aaee4092445b2ea1238dd3058597574d43842476f3e8a5976ab7ef6f4db4c3f58e42a6c716e7bf03623d190e5341e57ab2da7923773469d321759", 0x83}, {&(0x7f0000000740)="507806707c0dc0ed9a8ca1cde0af5293aae4ba91255ca04a360d0aec0fbc140d000bdf3a1f0e102eede8459b1d793094d9f082ac010f3cc0148762f9f4c2f4f0db1a9215308e55892fad170029a4195d127b68dbfa4eda13f9926e1434780e748f5be48b2b99b2aeecdcc73738b3505bf665e9a901dffc70b10c20a900e10801d0b8e283526b", 0x86}, {&(0x7f0000000880)="9de1fba4b45182afc78421afe484188164c39b1e8c030febe640d8ab80f77b2ec8473710bde1e870684c6d92efd73e5114220b6f0e0effc5a469f060304d2abf4ba37a6423fee54b227d634609ffbc5650aa497407389565b9a878068ca91992d3551c619bdcac19e003fc1217dd5531c4a3b7454c75fa81a7a23827ba454e919828f4243a4cea54a926f5d40980ae686c308665b8810f98623ea7b728f4c853392158822b646697c16d35c03f17b9613f90fed1a4457c86d053cc001cb04c408c172e65c166600c3597a98afe152034", 0xd0}, {&(0x7f0000000680)="a8d73074f19c33d19d", 0x9}, {&(0x7f0000000980)="a87746f6fd248f0b7721718ee60b7cfbff0f461f0f60ee5dfdfcb4a13913a585b07367ff597d0759bd2283e9079b6cb1a11a669268f3cbbe7c59e0d3bf84585e364e0c455d512d97583c4bc4970ed984c7fa9c2fc89d098ac0f394fb1147db7df3d8218166f54ce873a7c2c83eeb486cae1d8034a6fb13f8649edf97afeb195dba86964f7e6153576809f4080bce0eacbf70dcafe3ffcaf83343014f56", 0x9d}], 0x5, &(0x7f0000000ac0)=[@tclass={{0x14, 0x29, 0x43, 0x4}}, @hopopts_2292={{0xf0, 0x29, 0x36, {0x4, 0x1a, [], [@padn={0x1, 0x1, [0x0]}, @jumbo, @pad1, @enc_lim={0x4, 0x1, 0xa7}, @generic={0x1f, 0xbe, "11f6836d9b80ee27667e21cae49f4f7706b0a6efa698a231ad93aa9763618fb7d863d332fdfa5f3890f6ea72a4709f9747b7d912a614b74aecafadd533e6b8fa6adb59ab2d582e3e041fabb36455b211319016565b909cf73a69e444ab649840f4c84d7fa9b5b175d4b90d126c5cc24e6de2735037b3775d259c5fb91a90378251de39e435db219a9752f1a56240bd6bc5bcf23dc7775e4abcc6608f31d4e319f800efaa9c95db0db88d89138122626ff71ca0562b1534318018098f1824"}, @pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0x1}}], 0x120}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000c00)="c17d21b4db82703f3ea9e29f88034a3d7507a7ec6cc5e73a607fb1933f2ea82d5076ec3153f1e3a5ccc7f49140df11b325d279fdccad476ee069419e14feb4a68343c51814ef5477af2ce5a10d9740f85176e6453a2c242091a9ecb8b07f86de574e4ea8ad04b15a0a766b24b5a486228e1266c8abeb819b6100087b1d37f8541bdd5b999e3909033e9752e58022065859cc0be7811778c851848c", 0x9b}, {&(0x7f0000000cc0)="b19ba874437d08ddbc7b98a04ba9d261c214462541d21d29af7a180bf9c2b18d7e5a0165c3c26767f6427a6db6d2960b3740c9379b60644c773cdd63cbae82da45bbd5a7ae4134d177f5fda34cd6a980936800f013db9f69c9b53e233f33b1a1e3213370218118b4b6fa1da0bc8012d5923ae9cdc37f050919c97b896d79ae6287113711367089764fa82df57bc2db1bab9b0572f853269fd9574c8f90327c884bbfd1a5061ff9e0a6ac0dbf00f18a2e5b6f2c19", 0xb4}, {&(0x7f0000000d80)="6746bd80a334f1701c4300692d26c9450524576492f943228cbbdbbf1993318c8d2c0e5d3c86fd0ba97eb52028bb162bceaa6d7aba0b06736d6a91d0c0ea1257b0308d71d918400ce6a028223e6b5a5e88c71eb8f71c2e4d7d475b330cd6d234e0418fad959babe16257ad86ea95e06964e0888dbf1fb00c9d", 0x79}, {&(0x7f0000000e00)="344b7bbdd1424feea8c5e4109a2ae2f32e8d4e7195dd8d9339f468a5bc432900810b46812999c575a659fd4c7d3aa17a6d4dd62a0d4c3d0576d6b790d73d42db4d0058036a93f0df527bde1aaa2784e04c0d80ebcbc50c064200cbc36a28e7a069e51a8a82773f53ca8a56d093a835af87945ac31ebc7aad78a5c464fca1554eeacaf01878a36595cd4e7d258eca1ded4ece6ec5eaa784666343bdf4ba59b907111a928f2d3f84d715263872cab90c51ac4be6237032f9d551cdc6dc1c5da4879a2688c4723c8bd6bb5920052813eed495d8fe01ac27dfba567a25d84cdff29f0884a68783a858c7a4b0cdaed35b9fa982b583d7e53b4c0618ba514f6885e5bfedb341cceb004188953a3de805f258088bceeab5c7d580e7408d460617f283aeff150e65e95e2f112055c41c5658ec9d44fe13233da53266c14f2c5e0e9280c6bb3f6affd9876549fe3888440f313fa89e1067c0faad0d5d952412e952eaf1bb7bac72cd6208a36fd2f183a50926fe8f4faa1aeb017774e39fa134d664fca926c26334c48cd3fa9dedab5766481ed4c56f6be3a5cf72c005514e6152b8c9b3ebb0cdd377deb4220ed3dcf21f7bcb91ca3e81a309dfd66d7952d801531e65bf7e4a007286fdc77e8965844a4f28dc2e4a8eba20686a1f4a4ad7ace34f6197400867d852664769a883ef48ea421c4d4820c5d2c9ababda0debc0e8d25969ae1bb83cb4421004f498888c15c6face1da60e7b04de0f77587afb949cadab5397c218f39d259ae55446590080992da74014c11a5a73972c0816272e4ea24163b28bf8741732f465cd52c8026c318fb6bb196b5c9ca9cfdf62142469af4426813b6174f31acd39034a9bb5237a35ad1334de1f49c91d08abf09bdc643a9640e932277f9a952b4485c6ed1a3d9cedb11005761773988d4211c9d87074a43c2ea38afa22c5c86f4e38bf52128130690b793ca9fff931b89f3debba650f9fa05c48636cfab0580b26801e293804a9a995fb53144613a4c390427774f72e2ae947f17d2a19157ed2980cd0b4179954d272197e848ed6d69e3d0ecccf0bc7ac3ca49bd554593a5861f6eb2fb22311f95a9c137600c80323d7b242fecaea5552f2e35873a4403404c9514c022e3654b5a1d6be416c58f1f29ed2c2c50e9dd42659e60d9adf1d45c1e1f74085d0bad7fcfd769d025b0daef7ee182fb1d36b8353bc99149c7b071e9d6994cf21eaaa5ea6984a19d943ec42ded0940e8432dc436a814d9f97e3dd34572e0766da02bc322856ed98d6d06b7eaeb968e9b72dae6a69fbfc4491cc3256dd9767c97612d7a9fde94c60e23399322d8869fc451de8379319bbf56bf725ab6bff1ba7e05a8c569245a98346f2bba5ca440d9df402c8d9387f0d91a579d7a948684f643c1561a386903166c5439a84f923a10accd60666faa68a3ccd6a355caa4d7df130daa3e8b9ccb8702d9f93dbdd6140cc59a904fb134c7802d2f54ac875a9d579c187306ea0a21abf87bd33fa546d3470964d05e33805026eff49d3304358e63b6a49fee5be68753356baa5ef0f6c8cd24d7190a2aa556725b8bb98c1f008f20cc8395f81494e8ab6baaaf70bfdade0ec4a1d7f460c52ebe1dbf136896879b6e955dd325ddc98298db459fe37a8ef5b0f7c01310ad469ba9f24cf4482b1a21e353c802f1b9bf8b1b85dfc28ce00ac77c9de9a7c87ee236a87c15726b3ff678bb498fb40626d412defd38a40eec973aa0b43bdbec7edd32edcaac68c50d00fc9d48b0f3f65c7ea901208bced6f378a79193cad8a06dfb434bc60e70863f4485c615ddf5737cf051fc6e6cc646615498b68ab95e9428816141bdc284febe703e25ff591adada5a848cc171808ef8b06eb4cedb9b65a58e79398eaa0d3b2ccec790425aee659b5ab1e81f38d1fa9cf8066b30b7611aa2263044b88aff4fd500658bc8471828afd4768dd2681bebb99a24bf0d6b28fb2732da6fd5bfadefcd54ef9e21a807234e7e2112c4d34e228283a3b7bf8f2b258b6c3a5c36dd29fbf189f2fe1df36d92d084b06bdfb327d3c71c9d2d008a70382d7340c4d33641bc638947c99b388f92220383c44caad99058494760fe6743eabe3bae0c5d3b1bf981dd0d9840dfff0e71eda6c05ac16443b0a39f881013979a960c32e22de3a13ca079e54f02c145687ef2b1417effa1a36eb5e44a17e4516eb508afb8abd0b78cf6530f16cc338ec7c88329a5a0e97cd1a30f4a1d761be6be62db239ee45eec25058db6a28624f5c3ceb894e59db8425cdd66ef746db2c14e0003fe7eceb28e9caf74c72978dae5ecb76dad331ea1c8bd25f91d2b165896d95d675493ad2714934646f1c0d7806212f548eec2dbb8ef4336909bf90302063ab39e9511076216526810e75a6c5f6d771c02cf7fb7d12c1ae2ba4727d5270d983826f70bf7893f46d4563d69a0968284dd061ebc7f82b6f18731880c6b733cf05750b1918360136017e3a7dcbed18d21b430d47951ed1e8688778df56863e0ac450d87a90d4f099f5dd296f3501305514a1127b8b1f070913777f67338aa89c44ab5ab3d66e16ae199d7712dd9dbfa8842c7e7acf15fef941430f3b342a82ffd950b70e44209be89e2af9c92de6a02332d0bec542aa325ef9dbd1f4a7d5ed553bf11f45af40e4e7191532cf54253363e4e61f05cdb84f8efe1383b41e2d77f1e7e18af6af593a0872d642f0c8421336123e1f416153db60d53a4fbb09c62e617917e727d6ce8f41c11fe20ee43e167a1856586a449d96ca34a7e8c2811dd7a0f9d4c57780ab721012b48361f6eed5fad6caeb4c9740374e8e0f9054ad4c991a9c7a765f47c1d62744676dfb9b472a67b6e88638674c192a5f3bbab675bda07188dee8d0b468bd910108b759bf8d5f6b1210579676c3512d0abeb0f978dc05b22c49ae60afef3acd41a7f4191bbb84cbbc7de89e7e83071b32ae1387f852db6a8b3e0d434d80d49616111d9448341a691eb4bcbcba5b65d6f3d7237bca675f4983f5fee1a37cbefd66982fc221bb2c744567053735a95b1ad3775ad34d9a3c1fb46ee2aac2d8311ff42f04ef775719f47a197be504472655386778195186aef964c4780d8750152cb8b0a4781e59226b4c026541035bf35c172f1729e91153f77a583e44566c8760c2801a8050307ba217d4a7f7619c36446fa38735c67f5b6ad14c14251f088a6bb2fd2b9ecdb46ec96e2b66a41ad6b60a914e26fd2bbcaad5a1a03996ae88b23fac6db1617c6b951131b4d6e34ec7296cbca57a34ac2f66e2ee8181170e09b7be726e954a02e00552838d357658da5f52405a28bbd04e8a8940c79700d47fba099a6c2bde751124f7ad9986a3621f693d1e8ff1731a873edfbaf72f4d90abf45ab41c47587dfabc74eb95718a00ab86d275e500624dc95771209f1bdba54b5775b74b8938710d42c04b32e8b1c0c1d27263046a3919f957f3443127c006a030c5803130a500f2a9e1ca2389bab8baae0f078aa54b4e0bae5e5c6c481581e7420c7249ff6c4f1c7437dd9a5d0cfda6fb8673453538adc7216284a2ca57509ca4a91ab1935078dab66da9f18e7679fa685fa602b93565fc15e7e056523d73a917772a745c0b3c4237c32cf90b7e344553e6e79530327e530c8ee5f72b568fc0d73b2040067022812a3dadd9ce1858455845ce03c242979bfaa2cdf9ed7c372f02a4baae55c302fbb64172c600fe4deeaa19445522a19c1682acd696693b0b1fb06a45d5e9b0017af351ef128da510e1d8fe196415bf3582ade8be9af5207a3a78c7796aff1b1ed19414ee083d995fad678a23cbd3828a4c77ceff597636329558e9848099b36d336375a701ede21b6b76239ca3adfb0c603b2dd7c8042d3676b814a8374cc6077a80f4c662a37dbedd021684cc1d4d068b3b29a6c04520e52ec5efb57835ad8fc7bc9b7c0088cf9f77f2dc1192cbe4d626d41b3121ff16c68e2721104b7ad78f886762e94697559866062ea7419d451c8f39b21b6b3e61eabca5166701158062faf624628dee8df2c50447dea776cdf07decfb8ac1ffed20e2b10b42faa290f6056469cd339e0752ed3993f3e0ab8180add058e1ac5caf86002e5787f6b79e0c3127b461ac7ab702358b6d10bf0a95e0685ce1d270299baec7a04b6caeaf17a03bd53076f3104efbd98db921a225d06aa95ad5db8509121919b602f64ea94993ae44256785fdd8569bd2767876f4b43bab121d6cd74e7e8e10c52b3fe4fc2af6c8d427c3485304d8bc482efaa89999905feca193e13e49c91652ba620e048e5a484c875b8f7106e1b7a128f420b24ea7e6ba01cda4c18e6fd03c720e4237cbd680079e3ebadbb7d1749e2facb597c8e33ee7c3ce325b193ddb737877a6adec6291c7174d79773b07e642195b9c3ac348845d7ac72de53f2a966f1ff971f8eea8a6ea95ed193878e88942570efb30078c0ced45c01f7111b16a6563074febe7c3b770fd51ec2a91f4dae615ecb72936f219bf0dab8d020978da70acae17302c170aa50abaa18881e1070d6f4e2ff147b39bdda22a6370487dfd7e4767776627cb21eacd9bdc845701c332fb5719f0455f155b1abbd1c109f80706174c6227f62e2efd012ff97c5f60660edf8f55a431ada3b093c1b968cd3f5084c298f9c3b86b2573dbaad17b9df630a0758535908edbd2164be1d2c5a49b39a125a98dd41f810a5c6203bb86ddfae5f3d916bb3d442b12aede6742e8112e89894666f87c9e436432ae2672af1af63ff2f74494f4b3789dba6dd892995c6acdd6f8929049c98a0420d97b4ffc84b71d7381b2c456ce147cc11cb6ec2ffe0710aa52a388d3c08ff36ed78c58750a78b7980ca4a5950777fd698c68904e154d99f04d1702378c30e83e229a9a1bf4ce7d214f5424e420a9030630cbba8fa96492124f69f0bfe74d1805aad6c96bc335b691712712f8e6d49c79cc79f88b0b572f1bb9f20eb8fd7787cabcc63688c33e847516d757f8075e8a0fd07258942b2600b27a8e3f6c446c83d42787d20764a7cc0aa664bdca2e61c5fa4f61b3e394b6ad3297c42f7f233d1ff77ed1deaa1c406db01a9c9e410fcb9427c839513914edc01033be12e6340c003a7126ba47c0ce77b884ee00920cfe3005c58f64bb793048f9540549234efcc42516fc49987b140bf6ca1844dff0b04506ed7d3cdd6b54f49082c3ea902d4f1c1affd791a30073a53f56083a51b6fe77b73d09e872b2e5eb2f10b35291f8983e15b605e0cc56fb90b34cea51c57f118d63054f7fd9458b3e9c1ac14c138cc69499f34903327832a6ea204b9af84cf33a5ec5ca48db1c2d9b1a99c113fabb9d4599cbb9a3897fe53e4507711b44ab163794754ac83f019daf30242d08830f120494ca71fada7632347000aa7f8720e04926ff8af71a85612514711ecbe595504c93962be50be458e9a88ab0b475df399839b34f92e8a2244685fd7cc3946f3dc89557c1b5b1997bfb9fa088624494d8bd93fc2b8f878611533a507eb2b8fd31710baf960b01b2a9d0be7f8a95d8fe20131006e8c2ee34b5b5319f58ed6460fb0ca709a8041ad85148cea63e012ebb3ffefa8142bfa3d28afdeca64f84d9951a3025ddafb90269f1d7e374a5a706099553abed499f3d3623d28845dd341b50843166de544c049063ffbf4fdf171b270988b04fdf79023988ddf98ea91e5a883f6211eb1e405253d4c5a8bf3e571a71b906d2025b08b8d719d58c5c0aa9a87593545a2f0f65bd0e7ebffe844912282d131834608400a33e094583d9", 0x1000}], 0x4, &(0x7f0000001e00)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0x88, 0x1, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r2}}}], 0x68}}, {{&(0x7f0000000800)={0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}, 0x1c, &(0x7f00000021c0)=[{&(0x7f0000001e80)="fa4d9807b056e1d89a2d762de0f5a6b018ace41bce32f32e521bfa9f0d48e11ac32bc16c637a9fb85fdc6782ae09b9151d1891e2e593de2ea266cfcd3e9afc2ff423d5e05be2180798617c8cb924353abb7a6f213c897f724a4281dba6e290d7c520f6b5426a3233b2eb2be8bdc8f602cdbb69a737e21a5142199ca189bc25cc958b1fe41b32b75985f38183396f446a44238887e1837a75dfc83301c8fbd559fff79f1bd390f2373f03d65c11cf4fb3b0cebdd7e3285eb467cc2276aed029b902f759a9aee9ab484c1bd9bfd15c9fefc1ac0c7e64b679d6e5f365cf74e9b65a0f97abbf45a312e7eb568c584f7ed24effcb", 0xf2}, {&(0x7f0000001f80)="1936d5a1597b14b6de14c823fb79a0c829d9f4d557be8b65d884dcf68f170a028acc130c0a2e21ac671687fa3eab6f12e8b75554668d186af2dd316656c1ec516e5ff7a20866183623e8f3ae56cce174cd36037527634c91d30a39f88a7a97960c7c9403370205eefdb90df84f769bb1c40f91c68492008e5fdfc149d1cf8dc0441cdc04706ab67e96c61716dec1516a2516d00774b9f58eed1d20d93d94c8e8350a08a15399bf84672a84693ea5ca", 0xaf}, {&(0x7f0000002040)="0472cb6e8386a190f08a24d54ed4d6f9e40f22787b0417d8e5065bbb0677205e8286ef11ffabc920adea69d6aef6b37a0e480c6ab8d7ec84a87772fcecf866f001b3de810fedcf71f6bc2082c9ff97f7e6ad9415caaf", 0x56}, {&(0x7f00000020c0)="55d1cdf1da68f04fab2eb585be5f53a81d7d2a8905853757b3d4dc089d8e0597f52bf09c0ba6c9d65990e41f8b133c4f6cef3b7465cd39f348eca3112f1bac0ffb7f6350a342d2736a45a3ff82e8104ff70456b6b9cbf45d9dd285b8c05bc5048691922aee77e417c27965e3fa95aed2badc6a44cea4f362acc024a0496f79a3ed0a3d32075ffc7cb86cf2", 0x8b}, {&(0x7f0000002180)="ace42fa8c0a7e54954b836d742f78f8b1d1243ae1ef0aa013da26a1edf52e4b9a2e6fed960e254c6f8a047f4a715651779561080da17b907", 0x38}], 0x5, &(0x7f0000002280)=[@dstopts_2292={{0x1020, 0x29, 0x4, {0x84, 0x201, [], [@generic={0x4, 0x1000, "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"}, @jumbo={0xc2, 0x4, 0x1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x70}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r2}}}, @hopopts_2292={{0x178, 0x29, 0x36, {0xc, 0x2b, [], [@ra={0x5, 0x2, 0x7fff}, @generic={0x4, 0xd8, "d0fd91dde8a850e1b87265620124e10d543bb66c14daf348746e7a582a6a05b546b1f5a9058d34cd6db0be6d72f6ebd9eff488134db7e7d90960b635de0549b5da611a88c3852dcdb1b7a2b0153aef7b5bbc1e102c1c3841937e4ecdf4e044725ab419aa42ad7a59c043d95b9f8da7c4b3e38fa4890d9500c040fd0788e1c54382064e00cbef092d27db2eda9f1f3be3b80540eaebc5b64abd6ba0cfe3112dab1961e3b70ef184f7abcfd1485433a0ffc46297ca7662418a887d4fd151a3420736307aed05b4ca5535a8236a0ba9eceba690d659deccfe5d"}, @generic={0x20, 0x6d, "8fdef6faad536ca532e79051ccfe5a6d4fc7efaa7553f576cab20f60244c347cc54b017b84da77dda91feff07543c35bd399352b8ad01338068aa5e4ea7d3cf79653bb84024daa94f3d63270bc55cb0c2c75509a7ab857fe85ddbd498f9c23d6a6619ad26a056141b36f6ea9b6"}, @jumbo={0xc2, 0x4, 0x9191}, @ra, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r5}}}, @dstopts={{0x1020, 0x29, 0x37, {0x84, 0x200, [], [@generic={0x4, 0x1000, "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"}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x100}}, @hopopts={{0x88, 0x29, 0x36, {0x2e, 0xd, [], [@generic={0x1, 0x67, "fc78de93894202b1a8df8a51b6c4844e32f4df3c55c5075a3f84d42eeb9c59623a3fe8d125986c3516ba6f44a58dbf21c3b4191af5f7317cd5c08023931f16f2aaa99892a0e1f8d0318d1c318579ee1c68382f795b526a265643597d3a5e679e90cdf9248dc622"}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x32, 0x6, 0x1, 0x34, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, @local]}}}], 0x2330}}], 0x4, 0x24040841) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r8, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r6, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r8, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "65cbbeceabbd1126d52f58bac6"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "92df6da1340ca509b87e5d9d70"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x54}, 0x4000) getsockname(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @initdev}}, &(0x7f0000000080)=0x80) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:32 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000040)={0x1, 0x3, [{0x800, 0x0, 0xfab}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2000}, 0x4) 10:29:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ffa03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0xf, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40001}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:32 executing program 3: ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x9) r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ffb03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000000)) [ 1160.140193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1160.141360] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 25.0 filesystem [ 1160.195724] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1160.230805] squashfs: SQUASHFS error: Please update your kernel 10:29:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:32 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ffc03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) accept(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x80) bind$isdn(r1, &(0x7f0000000280)={0x22, 0x0, 0x1f, 0x6, 0x2}, 0x6) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1160.346612] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 25.0 filesystem [ 1160.375871] squashfs: SQUASHFS error: Please update your kernel 10:29:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffffffffffff, 0x12c00) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000080)={0x0, 0x3}) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'wg1\x00', {0x2, 0x0, @multicast2}}) 10:29:32 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ffd03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) r3 = socket(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r7 = socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYRES32=r7, @ANYRES16=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x4000820) recvfrom$l2tp6(r3, &(0x7f0000000280)=""/218, 0xda, 0x20020120, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000000)={0x5, 0x5, 0x7e, 0x1, 'syz1\x00', 0x2}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) 10:29:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ffe03ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0604ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1160.527667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.528039] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 29.0 filesystem [ 1160.549338] squashfs: SQUASHFS error: Please update your kernel 10:29:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = fcntl$dupfd(r4, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1160.617841] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 29.0 filesystem [ 1160.640180] squashfs: SQUASHFS error: Please update your kernel [ 1160.686016] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0b04ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1160.736859] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0005ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="003a8f0000000000280012000900010076657468cfd416e6cf14d785a46de0d5650776b6287a60fcd1baff437f8fefa9ace38303c4e5840c2ffcd1"], 0x48}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$CHAR_RAW_FRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x8563) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff00000000009b00", @ANYRES64, @ANYRESOCT=r5], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000000)={0x0, 0x5, 0x54, "a6a97c33d7be2f1fc81de637bef32d64c8630b503c662b11b17022d9bae2b004871c0e773234fc61112467a19b560bcc8534154b8faa45edcf518d4d64195e94cd048c8ad5ababbd14db471d8f926a62f505c34b"}, 0x5c) r6 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000011000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1160.880784] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 33.0 filesystem [ 1160.902692] squashfs: SQUASHFS error: Please update your kernel [ 1160.949106] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1160.987773] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1161.002770] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 33.0 filesystem [ 1161.009745] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1161.042645] squashfs: SQUASHFS error: Please update your kernel 10:29:33 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x8, 0xfffffffffffffffa, 0x2, 0x74]}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fa626ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x10001, 0x600701) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000080)=0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002005d00000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000013000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x6, 0x2c}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x8c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x5db, 0x4c}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x12}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}]}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x3}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x93}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x6}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0x3a}, @NL80211_MESHCONF_FORWARDING={0x5}]}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x7}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x8c}}, 0x34000040) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r7, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r8, 0x300, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", ""]}, 0x14}}, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f00000001c0)={0xffffffff, 0x5, 0x1, 'queue1\x00', 0x4}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffc000/0x1000)=nil, 0x0) 10:29:33 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000280)={{0x0, 0x6}, {0x1, 0x8b}, 0x8, 0x8, 0x7f}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x800}, 0xf) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655fcc26ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:34 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000014000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="2b00f2ff23000b0f004749bed6ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='[)\x00') ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x6) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) accept4$phonet_pipe(r1, 0x0, &(0x7f0000000280), 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) recvfrom$inet6(r1, &(0x7f0000000180)=""/119, 0x77, 0x40002160, &(0x7f0000000000)={0xa, 0x4e24, 0x9, @private1, 0xffff}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655feb26ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:34 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1161.648298] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 93.0 filesystem [ 1161.667541] squashfs: SQUASHFS error: Please update your kernel 10:29:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655ff426ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1161.762369] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 93.0 filesystem [ 1161.798569] squashfs: SQUASHFS error: Please update your kernel 10:29:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f002fffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x878) get_mempolicy(0x0, &(0x7f0000000000), 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4) 10:29:34 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:34 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/exec\x00') setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:34 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}, 0x800}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0030ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x20044845}, 0x8000) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) r6 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1162.103023] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 159.0 filesystem [ 1162.120654] squashfs: SQUASHFS error: Please update your kernel 10:29:34 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000180)="109535192703d3423d4303007283bcd7c9b2c4b154cb0100000008c3aa8a1e9a7dfd6d432659045f6cf301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000000)={0xdc, &(0x7f0000000280)="5046a1a53dd35906b4b786eb7a8b3f03e841bb446f756f0709003add580ebad66cbfc373de19c390b90f01b0d32798fa18effc179c2690a69bf237f403edf745b942060ab4c4fea627d24d3f3962fac99299cd881f8205a2793bc523e506a1335cbe233d7ab384874907f6916011f226700988fdf48511bc5e7c44319b36293a49f4cf8974a06d11f2f3b4c0091bb6f109045e16e640d2039c59fee0b6614e9e5127d182134bfb063ae7507923d1e841ac6af553ea60559191e0e809674d487bb387038021cb4512ab63363855900cea61b41f3678be1999a7699eeb"}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:34 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1162.208819] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 159.0 filesystem 10:29:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0031ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1162.257632] squashfs: SQUASHFS error: Please update your kernel 10:29:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d0000200a300000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0xbe}, 'port1\x00', 0x0, 0x100801, 0xb8, 0x9, 0xffffffff, 0x7, 0x1, 0x0, 0x6}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x100008001, &(0x7f0000ffd000/0x3000)=nil, 0xefc0d7691bbd46d2) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x4a, 0x8, 0x3889, 0x3f], 0x4, 0x80000, 0x0}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r3, 0xc00464c9, &(0x7f00000000c0)={r4}) 10:29:34 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) accept(r0, 0x0, &(0x7f0000000000)) 10:29:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0032ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:34 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1162.480289] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 163.0 filesystem [ 1162.500505] squashfs: SQUASHFS error: Please update your kernel 10:29:35 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf25060000000c000f000008000000000000080009000200000008000b0001000000"], 0x30}, 0x1, 0x0, 0x0, 0x8100}, 0x4040000) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0033ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:35 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = signalfd(r1, &(0x7f0000000340)={[0x8]}, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r4, 0x1, 0x0, 0x0, {0x25}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x94, r4, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x100000000}, {0xc, 0x90, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x40}, {0xc, 0x90, 0x94d5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000}, 0x4001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = dup(0xffffffffffffffff) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) fdatasync(r6) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x48, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x12}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004000}, 0x8000) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1162.661683] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 163.0 filesystem 10:29:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f00a2ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1162.706251] squashfs: SQUASHFS error: Please update your kernel 10:29:35 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000180)="109535192793d3423d43ce9b7283bc9d2b0e9f871e5e99ee4d342ecbe4cb4c34cac3aa0000000000e30000", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000288000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1162.850027] kauditd_printk_skb: 977 callbacks suppressed [ 1162.850039] audit: type=1326 audit(1607768975.301:177454): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1162.921772] audit: type=1326 audit(1607768975.331:177455): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:35 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) r4 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vmci\x00', 0x2, 0x0) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000740)='/dev/adsp1\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) sendmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000300)="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", 0xff}, {&(0x7f0000000400)="d071c249d378030e59de7a7384ebdf1a0a64085e038e325185dfad801fa19ac629b6b72facea1a0094b55249d558d42a4cf8f23ac9fcef0f6af456f7eae22630a3ab3d3c4f3293a8bcb5adb9fbe56933dd7c26e95c", 0x55}, {&(0x7f0000000480)="f9bfb307218f402d6d8ea36f56c5ed488e508f5c5571ea9491e9a8d1fb75af2c0ca2d2c4e8993e4208977f38a697ef959d9cf8b20d70c5eae8ae6c4d184ad1de1d9a633646689b", 0x47}, {&(0x7f0000000500)="44834451ed3f5566846252b8f3c8acede83c7d546b2d7c9335f4658d9f236f4dddad27eb8f5985e52a0155bdd9adc3b6b965a79336445e23fdd68dc01ad1ad722bc3b60fd28a08b8ee2ab9a349c8d05240efabb4a1cb1d3f86253e28115cb21003de", 0x62}, {&(0x7f0000000580)="09384619b7613a8cb5511f96c46711d91fb9b14b01429ecc8473a468ce36fc021eea11c44e39883b939c8734d4afd294bf5422a5acf80bd167164e0a05a9f460b1dee77dd44ea6f2ee2866e90b3af250232806e390b93ef853c37551c928bda7d6f57e841108b2176c4f2a42e62a430d177b15aea2e8d7eef273b166a32b06638b0da6ba62c409e8440c5416b443690c7ea29ae4d5f5b028ebcca7f80f8abc98e049b5aae008972c510587cbe80295b57fdfbdf70705867ded0c066f1f9740250853b2c1fd19d32e63475bf1", 0xcc}], 0x6, &(0x7f0000001880)=[@rights={{0x14, 0x1, 0x1, [r4]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00}}}], 0x50, 0x804}, 0x40000) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x2, 0x2, 0x7fff, 0x2, 0x1, 0x40, 0x5, {0x0, @in={{0x2, 0x4e21, @loopback}}, 0x5, 0x1, 0x9, 0x3, 0x7}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r7, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3f}}}}, &(0x7f0000000100)=0x84) 10:29:35 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x40080d1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x8000) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x0, 0x6, 0x21, @private1, @local, 0x80, 0x1, 0x8, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000003c0)={'syztnl0\x00', &(0x7f0000000340)={'syztnl2\x00', r4, 0x4, 0x2, 0x72, 0xfffffce6, 0x0, @mcast1, @remote, 0x700, 0x8, 0x8, 0x9}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x20, 0x1}, 0x8) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000180)) 10:29:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010400ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1162.961597] audit: type=1326 audit(1607768975.341:177456): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1162.985743] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.0 filesystems are unsupported [ 1163.020276] audit: type=1326 audit(1607768975.341:177457): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000880)) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:35 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d0000200040000002601000000001b000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010013ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1163.101299] audit: type=1326 audit(1607768975.341:177458): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1163.158203] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.0 filesystems are unsupported [ 1163.198013] audit: type=1326 audit(1607768975.351:177459): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010026ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:35 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, 0x0, &(0x7f0000000180), 0x80000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff3000/0xa000)=nil, &(0x7f0000ff3000/0x2000)=nil, 0x0, 0x0, r3}, 0x68) r4 = getpid() read$FUSE(0xffffffffffffffff, &(0x7f0000011900)={0x2020, 0x0, 0x0, 0x0}, 0x2020) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000013980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000000)={0x3, r2}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000013a80)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, {&(0x7f0000005040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000005340)=[{&(0x7f00000050c0)="dfb5ab219f23001e8be53aefbbd127490a0f0df05f92a53a2b87c6eed57eda59dbf197e7099e8531cb454054c057df762a53a625b1a49c1f78a59646da1d51faa6996b5bd28369890aea0b17fba96ed9fb4033f8b2251d2e5d2c9796a08cf109a732f8a57a90acc0a9fe70cc9794a62e3c2ce330bd7caa722b285a0a644c07506e679525128fcbffd7d7813431e838463672838320ac7d49dec6f9a16c6afc0f1434807ba6c878dc4bd6d56119c32e62a23c2b8b505058", 0xb7}, {&(0x7f0000001700)="bf9740798671868b29fdc0ac2d5c050a8094f916c0557048afa11553c8fbfd9567b500e2e721a860a890ca323f20c637562463c68cf5c825dd43128485bc088785e9866588c0cad87b8ab997a7ef811e8ac313319eb1ee51bf44d06b5d33bda74427edb5a5af9c25c78273eec9843a360fde0f45325cd4d961003b207985a42122b71a9ea86ee342b8014b16966a50d5bfaa3dfb361d4f27d5667c823fdbdf676b870ed8b4abb7491093e5621a5b051ff3d680a37649071be85f292dfae736e72aae19630b2bf9f0d052b555335249e97c8d9519698cd543fa95", 0xda}, {&(0x7f0000005280)="9cf77121e91bf5d6017eb53cfea35e0d110c85fbdad54d10473e0022241d54f3f07d18738cc1980980279520065436730d5b2ecb2b6567c7e8ad67a4dfd55c82cf11b70a0ba5e5306b7e9901b9aeefb3d3e006acd42db9a991f82cc7d659d87b52c8e096a5b08dc16d486d87138d02de14d5085b82191f2ba4d53371f83957789e418f4c5317b0be19b0", 0x8a}], 0x3, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000001000000010000007c52dc86db513d5611e0c3cfd94f2fc72982e570a7413dda54f7b802e03fb5dd6031602ced211eaa1f9892c58d706506e37edeefae4531922f4e80e35f719faf901a8f4abf362f3c5560e80c43309f6c55365c3a41ccfb0ee8962801073bb7d2083f2a50e9ee", @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00ea1d962b406b072700", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="000000002000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x138, 0x11}, {0x0, 0x0, &(0x7f0000007d80)=[{&(0x7f0000007940)="c6442fffaa42fa071ac1fee9188869ddcb7238aa83ef8ba5822fb55dc8bddc633c3eed2ca7cff91a0f81d7ba01c485e9f0989fcb516a303fac14033ea9936c8f6d7ec061a0631d38fd7bdca088d83e2281a04e0648e80d33f7ecc27a4b871f1f6903", 0x62}, {&(0x7f00000079c0)="8ce93bbe929335200199baca7cc8e15603f607c321d355cb2e05a09f08ea48e1f4757f45c4eab4466ed8bf3e2aad8b925aa3e684ca855d708c14", 0x3a}, {&(0x7f0000007a00)="f6c0f1a7d8c31f7df32c7612a04c9f840635d335f36ada4a8b4030812988e479d9df116fea604bc42aeb046c44e13809f405f54c7f399c46d5d15c32b917dc397f4d37f179b08dd62b17555960a04e0b522038dc0d7e1488f4b78e753bc649d21e20c73b9d235ac3579e1ceb8bedb876ad27d09e94fdacd0c636e0bc1ef93ae266c3bce9e891f1a394a4033c2a2ab1ec70932b5cf4db66f2e2c317149ba0f001ef578db8f6c182b4b871095ea91c1dc031aeaca1", 0xb4}, {&(0x7f0000007ac0)="c91aed8871ee9f44b723deaa0c5f6dff7ae1c7edfebd5263ff4455e37dbf30821b7b005ddb5bd653eecf643caa7789c8ade03542d698", 0x36}, {&(0x7f0000007b00)="f56cb21d8a5e00b64dba318dd25bd87fb22743c818d9b579065948b402d84a15ef0f50d407e468ac9e679ce4fbff8402282457d585eb89a2c1004c5a314e3b4b40231e47", 0x44}, {&(0x7f0000007b80)="17c4e280dcf1222a74d448f2b23a72cdfb9a22319c34ef1eb82b02063e0c6e110d444b176687f3d398a6c62bb47d1027dfcd756ce01e86fc507070c3a3cd94c1f73afdff245d6a8573c789ce1b8fa7f7f56dc7eaa28d746b23dd6dcc8164b6a5f1afb08c2867b3b393ea601e0ecf3f6085", 0x71}, {&(0x7f0000007c00)="0cad2f688a80c21e374e8ea9c65fba38c96ea0784cc632f8b9faaa98233442c861d9c2bd36bd5645042beceaf932f9", 0x2f}, {&(0x7f0000007cc0)="20cc689bc44f75db80d7a6f4f931b87ec7951c82f15b14d974f80f9cab577918df580e9614791f4c59f1cd1e24e7f7addd06f5a1b8ad86dccb7fd1c07b5c742fe8aecdcaeb3ff34ca39606cc4898e600d5a7843075bbfedb1b3e01424ff4c325e10504b044d0e96935e6c73b88a1ef934a958932a365486ba9d08a2be11ede0ac33b462074878bd75d6b4c49", 0x8c}], 0x8, &(0x7f00000082c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0xe0, 0x40000}, {&(0x7f00000083c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000009480)=[{&(0x7f0000008440)}, {&(0x7f0000008480)="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", 0x1000}], 0x2, &(0x7f0000009540)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3]}}], 0xa8, 0x10}, {&(0x7f0000009600)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f000000b780)=[{&(0x7f0000009680)="a2253b1bf585c593a269c1082c9de9ff2ef54e6873af094a1bd21f09b72b1ec086580bbb9257ed6b213b4b", 0x2b}, {&(0x7f00000096c0)="bbaa8e01aa9f09347d90c54df0f3f018a71f88ec693792f0ebb7c2cadfa29ff704c1a9310deb5e63fdb552e57ed6e02e847dbb25c8d06d833e983fbf962622d61ad41f838dd1", 0x46}, {&(0x7f0000009740)="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", 0x1000}, {&(0x7f000000a740)="948c366dfdcc867bb0a08cd064", 0xd}, {&(0x7f000000a780)="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", 0x1000}], 0x5, &(0x7f000000da40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x128, 0x44}, {&(0x7f000000db80)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f000000f240)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x98, 0x8cd0}, {&(0x7f000000f300)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f000000f7c0)=[{&(0x7f000000f380)="fc2db7f5092b575bdaa16e1ec7dd779a6f8fb26454cbbb9c2509be31b4cafd3d4f067ee8b95c32204696fbee909bf1ae1238f40e083b4602dcac7d1f5ac3375f2439f299c51809743421a5e9449bfaf695644b671ac7e94a432a4141e9cf137c1f7a619ae37224cb7fa905bd98a624a92951c3191b2edfbec3fa3b180ee49cd70ec8cd", 0x83}, {&(0x7f000000f440)="b2c8bea430f771e31eac6646", 0xc}, {&(0x7f000000f480)="3c5e56fe1a05d35c16ec34fcf285ee6025e11840e0ef2e9fa13fd6796d5ff7de13d23ca65a901a4be871aecb763f01f3e75578acbec87745600caf52b7b0a20e118e6e06bff090b92e6eeec202495283e959163b822bf2a0d5b407be23ef33282628df3083496f5dbc7f82859c75d41a364b6e62a63483263d2b9ff9194b37f1bb78be7a7f7ad9aa6c52fb3b18102a2bacadfa23de7a156e281ce1b5bb78829303b8d4d29e826f311b23a9f65ed002b7400b6cfef81ed2ee0d63074a2a1f7477e09c541f093123e48e37f4cb351b8c89cdb35cf5042b24da6911cce8cd0103b7f3f37343fd129ed1169552df02d8", 0xee}, {&(0x7f000000f580)="9fcf22c88a75e490557c1249cabec68e5755cddadda9b32cc91cd0536480d6c6963944349f7150a09dcc1ba2eb7be722f097f92ffb9b55ea66e1d454c09d865c01fe630e5cdefa3d86533e4c1787d13f639ee513b513d1550faa300f802cd37cc714bdd4bcdf8a072a65907a4189223d6cb0e4d07fb88450a494e1bf34096cd9587f9366f8d8c381192efb14918b176ea0e855eb9ce203bdac67771456eb4308fa9e486931d4f752919e10710c21604d1730e3e00503e9ce7b89acdffee0f5ca4e46adbae88d1c6c65f29c6a636dbfbdcbd7fcab78996986905f34021f299fce3c77f68d27", 0xe5}, {&(0x7f000000f680)="a6847e997057456ad965b436dfeed8a760d267b5ba5fe91339093eeba339c2c4a78ad311e07bcce87b", 0x29}, {&(0x7f000000f6c0)="e5381cef7ab604e290d6cf028c7772c32145ad225e811bbb7f47c011d96385768840641cbc467d3cceee0cee6f41ffed934179938f33986edbcb661bc5f99f276ac39615941b0c2c419483082142160b27f6ef0176f1e8486f6931d3c52ec3a819f5763b26581668a1af0355ac90d4fe1f59c4271d0241b6121d3f15ffda248144c1352fe5a53b1685736ce64ca61d62e2420f6dfe1f27b764fdd276005e39f9eb03654053a159c48f0aba6453b30ed3a5d99dd53aad9b1226071eaa7fcaf62a464a9cefeb8f123f7da40a2c2d7e312f9fd794268a78803911e4188cb6f77067d265535664be94", 0xe7}], 0x6, &(0x7f0000013a00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5, r6}}}], 0x80, 0x10}], 0x7, 0x0) fchown(r1, 0xee01, r6) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1163.248090] audit: type=1326 audit(1607768975.361:177460): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1163.297631] audit: type=1326 audit(1607768975.361:177461): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=319 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1163.324746] audit: type=1326 audit(1607768975.361:177462): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=77 compat=0 ip=0x45e127 code=0x7ffc0000 [ 1163.348036] audit: type=1326 audit(1607768975.361:177463): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=2805 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=18 compat=0 ip=0x417cb7 code=0x7ffc0000 [ 1163.429613] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.2 filesystems are unsupported 10:29:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f01002eff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000000), 0x4, &(0x7f0000ffc000/0x4000)=nil, 0x4) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x2c, r4, 0x42b, 0x0, 0x0, {{}, {}, {0x10, 0x17, {0x0, 0x0, @l2={'ib'}}}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r4, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x3172, @media='ib\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x4040) 10:29:35 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008084, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:35 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1163.501039] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.2 filesystems are unsupported 10:29:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1163.592967] Enabling of bearer rejected, illegal name 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010030ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:36 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x70, 0x1405, 0x200, 0x70bd29, 0x25dfdbff, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x1}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x4}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x4}}, {{0x8}, {0x8}}]}, 0x70}}, 0x20000081) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000340)=""/215, 0xd7, 0x80010001, &(0x7f0000000440)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x44, 0x0, 0x1fea9110d3f967d, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x0, 0x71}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x8}}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6851}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) connect$x25(r2, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000040)) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:36 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1163.730043] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.3 filesystems are unsupported 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010031ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:36 executing program 3: timer_create(0x6, &(0x7f0000000000)={0x0, 0x2, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000640)=0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000400)={{}, {r1, r2+10000000}}, &(0x7f0000000440)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, &(0x7f0000000600)={0x1}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, &(0x7f0000000040)=0x3, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}]}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000480)=""/216) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000580), &(0x7f00000005c0)=0x4) [ 1163.881740] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.3 filesystems are unsupported 10:29:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0x1f, 0x1c, 0x62, @mcast1, @mcast1, 0xb7, 0x80, 0x4, 0x1a}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) r5 = socket(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="c7de47c418d74048443100100005140000000000000000000000000000ab179de9a34a7842eeb2a0a669ba5b000000000000423966e7117e468ff820c555ca468644da8000d22ce58f8e66ec5f2015d233db7b4bd03cce046fa91050e0cd9cb0c1ce8378730670ef8da9eac2b0d5533bb25c3961916a671bdc346a7c8921defd7a4e814febfc316b97a7e6ba733b7f", @ANYRES32=r8, @ANYRES16=r7], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000580)={'syztnl2\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x5, 0x7, 0x8000, 0x41, @private1, @private0, 0x700, 0x10, 0x7, 0x5}}) getpeername$packet(r1, &(0x7f00000005c0), &(0x7f0000000600)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000b80)={0x184, 0x0, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xcce8db3be6b381dd}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8004}, 0x10000008) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r2, r1}, 0xc) 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010032ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:36 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:36 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008880, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote, 0xfe}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="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", 0x12c}], 0x1}, 0x0) 10:29:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:36 executing program 3: sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000000)={0xfff, 0x4}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010033ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:36 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d0000200040000002601000000004c000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:36 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) socket$phonet_pipe(0x23, 0x5, 0x2) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002dbd7000ffdbdf251a00000005009200ff000000070000800800060004000000050092009a000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4004044}, 0xc000) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1164.126837] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.4 filesystems are unsupported 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010034ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bond_slave_0\x00', @local}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1164.276402] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.4 filesystems are unsupported 10:29:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:36 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000000)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x7fcf, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x1e}, 0x200}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x4, 0x20, 0x8d, 0xdbd8, 0x2, @private2, @local, 0x40, 0x790, 0x5, 0x1e}}) sendmsg$inet6(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="76e03ca1fdc4b873419c556c384c8d7875c9573c60ad5d0b76e77b6abd84738cc2329363fe02b454676f6fb81a581dc44979b37dff3dd9570bb7db05997080e9e33205d49fc7a03c3a00723edfe2f62dac009a6decde5caac4574bdf801aa35292f878fb26326f10403bc1422dfe5e6d6d4cf94c2a6ceee54f6c91a174526e0c73089da9c301c273958e4863982cdbc83f09e17a5667f368f2ad6e65ae2b3396fa6ae4df3347035dff3eb73bb49fb204ccab19f6a2c564306c314317fbe4ae827ed4c4b65fa8ab87d376eb1c1914c77a914f6940af9266fa1ed6439a0c2b15faccae60b3d951ec3e8daa6ddccfa7713ddb19a188b4fb", 0xf6}, {&(0x7f0000000340)="283f75df68159cefa77f27a26c6aeef134f4e30a43ecefeac1afa18422cadb312c75f04742ac1ed5757d9f588d3f929a5aad8eb943a3e933ed0efb0ced931f152b76caa20db83240f3c09dbcedcc4454325abf1abc091970e6276ef3c4cff39f163d95fe03e196b97154d368cc1ff4849039d1dbd2402167c0708e53ecdb585b0f0b3625345cef4707", 0x89}], 0x2, &(0x7f00000004c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback, r2}}}, @rthdr_2292={{0x58, 0x29, 0x39, {0xa9, 0x8, 0x2, 0x5, 0x0, [@ipv4={[], [], @rand_addr=0x64010102}, @private0, @mcast2, @loopback]}}}, @hopopts_2292={{0x48, 0x29, 0x36, {0x2b, 0x5, [], [@calipso={0x7, 0x20, {0x1, 0x6, 0x2, 0x8, [0xfffffffffffffffe, 0x10000, 0xe5e]}}, @generic={0x0, 0x3, "044187"}, @ra={0x5, 0x2, 0x3}]}}}, @tclass={{0x14, 0x29, 0x43, 0x2}}], 0xe0}, 0x20000040) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:36 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0102ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000288050026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:36 executing program 0: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x135000, 0x4) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0xad07, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:36 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0103ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f00000000c0)=0xe) r2 = socket$inet(0x2, 0x6, 0x615d) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000040)={0x0, 0x2, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x1}, 0x8) get_mempolicy(0x0, &(0x7f0000000840), 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0104ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = signalfd4(r0, &(0x7f0000001d80)={[0xb7]}, 0x8, 0x0) bind$phonet(r1, &(0x7f0000001dc0)={0x23, 0x7, 0xe1, 0x1f}, 0x10) 10:29:37 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1164.714196] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.5 filesystems are unsupported 10:29:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x84, &(0x7f0000ffe000/0x2000)=nil, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xa785, 0x131400) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0105ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x24048091, &(0x7f00000000c0)={0xa, 0x4e24, 0xfffffffc, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5343f000d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431afd24f873eb380e5500fc8c6c4864b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x8a}], 0x1}, 0x0) [ 1164.831677] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -30718.5 filesystems are unsupported 10:29:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000200000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:37 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0106ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000280)={'nat\x00', 0x0, 0x3, 0x3a, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000180)=""/58}, &(0x7f00000001c0)=0x78) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xf9, 0x2, 0x80, 0x5, 0x0, 0x7, 0x20000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0xae00000000, 0x8}, 0x1001, 0x4, 0x6, 0x0, 0xb6, 0x7, 0x98c}, 0x0, 0xd, r1, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000880)={0x2020}, 0x2020) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000028c0)=""/4096) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0107ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0108ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 3: ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f000000e8c0)=ANY=[@ANYBLOB="95090000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3954cd7d314d536f00"/58897]) r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1165.180180] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs 2.0 filesystems are unsupported 10:29:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:37 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:37 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @local, 0xffff}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0109ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1165.280144] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs 2.0 filesystems are unsupported 10:29:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:37 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:37 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0110ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:37 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x4}, 0x8) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1165.519381] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs 3.0 filesystems are unsupported [ 1165.555147] nla_parse: 6 callbacks suppressed [ 1165.555155] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.606493] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.611146] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs 3.0 filesystems are unsupported 10:29:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0114ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:38 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:38 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000000)=0x1f, 0x4) 10:29:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0123ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1166.010589] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:38 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f012dffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1166.115360] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1166.124442] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 5.0 filesystem [ 1166.152397] squashfs: SQUASHFS error: Please update your kernel [ 1166.192201] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0160ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1166.240508] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1166.264043] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1166.264769] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 5.0 filesystem 10:29:38 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f01f0ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1166.390011] squashfs: SQUASHFS error: Please update your kernel 10:29:38 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d0000200040000002601000000002f040602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:38 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r1 = signalfd(r0, &(0x7f0000000000)={[0x9]}, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000001340)={0xbb3a, 0x0, {0x1, 0x3, 0x4d1999e4, 0x2, 0x8}, 0x5}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x6a}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000002080)=ANY=[@ANYRES64=r7, @ANYBLOB="040000000000000000000000000000003d0400000000000001000007000000000000004000000000000000000000000000000000000000000000000800000000000000000000000000000002000200000000000800000000000000008000000000000000000000000000000000000000b0183ba27c02a1a2ddb8aea98bdb34da97062377b591eba12624c7dc70e603193bb291ae35b60ae5d77ae6309503dafb0a9c799ef802b05cda3a74a00f8036"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000340)={r2, r7, "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", "f1d37b0479858f2afc1e9d36ec1d55b734623e4dabdc7775178a3a6679d4ad2e103308b0a68d3b6057ef23591954b0ffb93081cba3eb8d4d3a6e4777222235a2208d9be3c61432d429bc1fe4d9a4b7a3018ca7921e6758fa6595925b03a0d9db9deea904e1d2bc140554d1981a0271bb82f58b68dd543661b97e915d945bccedc5f52871b696964773ebe2e10196d8a0fb1a479b347c82ed7c92e9048d193f4e09ffb4c23c67607e1c11c1cf668ef85fa6efa543c4bb4dee8563d71de5bd087338462a166ec2585d781ec20fb18c5ba9768b8db51db5b6187e3711ee0789ac4b838412facd5d0480f5531e8daddc419563084592d900410e26d836e72f521907328f3a4673a35105eefe9ed6b61627a82ccf261d1307cadee35c13b03418cdbfd8a43435fc7fb023556a60a8b6e2ffb1fcfb0cc94b3a3ed1fa335ba726460bb7407d5b8d959ae1dc383a724ebb51435f0a8a3b423ed4794570c7f98fe522b8f54b1a7fa4c397ea87b6e8926c71feff10f1a46b3ae6e46e18f248e0cd0361a483b075120f1cf2439ae2dbeda449dcbf593710d4bb0f9b3a9af1498a023ed5906f5c7a8c745a79727881abf73c0b8b87088e50b80344569ef2f714839e989a3a582fccd8cdc8dab08e854e1bff0c75c7b1ce859b54cb1836dd79dfa140e6271649bee8bea2009ef6580b9976fb1b3aaae96a7c9b5f72044cd754a663ebf3b0cc48c504d1d6f7657f74a127c2724d24d8e09ede6b84f2330937ea9794a42df3d15b5a557567d350607df8a8a17a3e3e4d05a61ca63171967b10b3907939abe324fdc8761775dde64c69e1b35872cd8530fbb5c2e971dad88a01128b21aed53ed63432858eb5c8cdff76640dfde5ad3bdaed578a672a813b0c0212f14f0b411f2d0f44fa5411c82145c60816a2f921b3615eb43141b5fbaa407d0829520fc67e7edfe7d2f39bcf426f6457112d63a6f67891fc030caadcb274d70d1306fbdce56724f7375599d6006aa346c9ac9da00955bd4dbb35b521fe3b6a0d16acb05ad8628ca6f7f652eb615fa9c85bc1a2d7bec712630584f31f838c72eaf49e04155b88b4e91f3fd8c7d38268e91576ca7aec1072376b479592445405d87844a72f56981127c8f4da474b918155aca64631899c47e6e80b931d8968deb40996a903eb89d18ab817738f75167163d21e2615ed7987050e09f0751ff47341189b88c5e68d638aef085c142cdd7900b062d7c5fde6020458a2a2bc93ace2d277be32fe7bfbb2928bc064aa315f616c729a05ee40d1290b50c3a04c07f33ffa63bdc93f2d6aa2db0fbed650dc8778b87b780d600ade886a2215326f4988df2c50a113855febc3ac7ba8cf42c63a2bbfa08077f9dbf559c962723b7d44195dec2696afff458c05335fcb52a864991d45fabbf58c1a329a9c7bb306ee26fc51f2535e0077672e238cef7ade6d91fb0d1de230a9909d641604a122832e65c57a7d6cb30e64b4443f3f0f38106f43d3d953f377511df7076696c31dc0f27d290a61f7ed8c6d48d35a30a58b0b3213e174782b05b2e3add4f34e26188978db4d6a17c7be12d6e2363f8bd7e50056f493969a038be8ad9ec72b42f674fb8f1e63c810945590ca975841587ac076f21d10a48a74f1fd704c80a1cf38bc31fa254112f1e5ab46e9123e999f23c6a1869970d5f352d68a4f70292064c48198afdbde9904d92a4e4c373f110df8d8deff6fbfeced2a364f4e5f4c424e14a62a0a4ec84c1d0eacc19626eb3a531d743b5dc20b21738f20b86361a340377415c6fce8e2a146970a82740af91a6d901783495d8a546320b605f6f0f92b27989a5691e168092124dd0d8ff8c25b4e593bf88498090c44290a5417ba7292fa75c55a0eabade0f0ffa4d22a7f83ae5e8d1508215227f266239ac44b355a375fb598aa8ebe86cc68162f1b0d6c61be128dfee05cfb4436808d9238fee7556daad36d7744abf96b0fdfabba3f45b0eff436d1bb4720a0b974b7da861a67df3f2a640ddd005bfcc4ae211df4e8fa1d0b59e6ab4ba71196a5e5100cc133639943a8a8143bc17b0cb2ed8edb9c71dcd4b4106d2095c58c54de4a66b1ef4b3239436ab09b9571ab519163ac5c35ca4912dece0e78505b6ab035bfb7149a02674ff78a17bdc14250020585315860e6ce037e50f54b66a284619a1cbfa56a8d5392643d83c287cdd23db7a504333b64e2b4a6a6d068dc1dcb0d27aaa29cd6e885518bbec195b93d9df6f633dad90999a4bfa5f1c6c76dbfa8c8f3dbacf530ec5c19202a1294042e1ea31a45c423122c7a58e627d994063b8acba4ae99c0c0b87183665f34102c462275c1a3339cf6ed4226947de3e3ddba17854d5f8630c8b247ac47b211f6c439702b01b0624448ceedc10fe4b56f3ff1e1d075efb4d301a2bded6b31726f2327f47bae6ca322e2a369a2251b8da86b305511a6b67876883a380816aa8469b0b4285565729ff77c87a47492be2a278eb28250dc0555a9cd814bebe1168b3f73759d7ca21b6afefdac4101ef1b51b9445ab325f5585cbca7d00fee6843d18efa41801d6574460df1a1cc64a05d1561c2f68cbe2be1db53829bb02502bb4cfa732be5182a36566433fdd4bfa5a933fcf27c48bf698553933c6a3ce5f619078cc356a2490e8be52e693ae67787b14195de61b972063afbc91a0226a5807fc23025e7a494edc88ba64fb97acdd1c09b2d94c5502eb9eaad87b3b05fd52109433ef28868f7764d04595a4836f60bd4c8191816606291254b278f7d282521c57d5ffefd77ae388b1fcfe16d047b00f82f52cc1f6b2bfc3cfedb20c9f8d74df88805ed162ac021866233b6cdea27fc4d7c40b0d054e2c91c4d2511e366e49ef6cb0827e9af47fffd234992c79e5644c8c2d6e7840c4262b2272c31604684a9972f8c7abf6666138333f82d84a4c3ffd663675387955f68cc26365924db10ce51f8aad36e471e22d73d111eccae8ff311339d56dddc1bd7e24af1669b4dcc4abd67f43e437e4e459bdeb3790a6ebb35ec656d2f48b83c65ce304fbcbccd4ab40a73c862b09f70170b6d372dfcb6cc4c50e79e4df0f5cc3e8f65628fd40b068b9255546a32bb466294c4b720587004c6e7d1b1fe9a505bd322423446b76256201d69cc4837ba7ba756485d5309d60f4cfb59839b89c91b5cd24ce08752f06adb35095c98ef952cce2fd8f5c963f08d5531db65bf049b7820a7b62be5fd7931da0d44407a20fc55932c6096f4ffa575c953660af909ba2537b3d024ec4fb50a87b738e6fddb00baaf05d40acf9b036ba037409abdcfd10c1d8bfabb33668cbb6e843f141b7cdcfbd207c3a2bdfd986dcef978865d55be232477810b9269b790a67e51a612f35a7e3642e0489da79d3ce89b77ab4ef26973a6a257868488f9d7fe077a5fafb0661db1abdb22f188216ea7ca6b36beef6eca52f35ff0d2de22b987994b5aca33091f0294f3985f6494b0afbe8f48d0b2f225ccb52800215d3d671ece749507a0e35fe6b851ac6f2c2ee90862b2472d02a9c1b5a220625f79af578f0e2c7e6b401db6e4e8799b99021fc22b76629e21e91e4f177cb78ca628381297986fceee28fc11c5240111741bf38406a2275c56da828d7ade54f0131c24c63b46b3640871b7f2b05782b191f0cab602b60905056906fcf6aee1f4d4c8725164283c2db1e790f2937fbfb0891e8e8808eac4efe56f5ea6171f2cd48623e137639a01a0700d9dbd2047c113d331c0fb586855382a1e36bc305d6e12a9e32c46d41728f26bb4587cf6d99b850a294bf8ad626fcee7450fcee9d8e23546cc98efc0a0743fa4060e91a290057dbc816e15cabb36a137a64ee0024c855a34ad31de6e16b2ce8c4e0138c0ab69a20b90187353843ca3ddc0dd492d17080d693d77e3f47c2a15f7cd73c1cc23da4e5f1546fba776ad796f600c5b464a4a0870a408ab5580cacdd0dd2f80e4db33d8e4172dfffa68496e683e84cf34075947c9d67214a2706e6f9310562ae4c33ba7faea2c71c294ca4feed18d14c5fd370a04825aa5eb0b12a2f49a95d52ccfa3aa58c455c782408efc314d5fb19a49aba4ae025069964c2a3e0fe1c5f2d278b620d42b99ab8bc9a5fba92a32d471f16cad62893b47b2904f53132ad9e6c104673eadac4fcc7e14b2e5c13dc17507f195ceec97e4b97cec768b4ac340e1d5ad7a9f32df3a67e93926d295632a3209239b98e7731114941c61499592248523e2942302d1e9197ae5c201c0f5c1a7da1731ed2b0467177bcee4eb5343dd8ff40939f9958aab1fad60b2e9056697c5b52b13ad2c81cfcd94f2d178ad78800ef03ae3aa6d0455b76ae4c99a80c302fc360cdc5436217e4ccd6efd500e4c9d6b8885b4c874f7c07b7654b79c723dd10bcd04269a21a941bc80ee13368f0c8872fc3e99d10c2444851c4ea9348b12e9ad51e35b4ad390d7ec5ff20e7c242e5f24d69c5b1fc0a287570bbda98019926f40d02768c93df8f1d4f13e2ead6c601de32bf3a3fe9e2d3f3efebc9554bc1a27d094a3f93b0620fdb3f5ba4163cc523054f5c6a11eed7a1feca441dc5bfba96a5701028200c214169d01ead997df32214b7acb366fc9a76f697dea548c68cb4e55e291f43d072f18bd30a2d72db51971b881759d3b1777fc1579ea9ccb306211c767d73e80c62e7a6cbf229f56f013f83955baa9cf2e9a979988cb94091efc59825b769517579ee3c4ce1db256e981fbc2a79faee7e54e94d2d00a11da10ec95cb8290931d05ebdbb4f7a06aaf69e5ff9e2fa75286b067a4e9332e6882979b67cfbc4747097614cf9906e61b7a11bb92cd8984bc3f61008fd154a96077baa9fe932c2fe324f633b629c77a2d3d9170bc53030cce62b46a6ab469bc8d1d7ffa74e2e063fda880f8d32b4a115f8aef52f0539f384e51005ce87ff383b773b12c03cb9ea06b50213de4b638ce80eb3cc09c3dcfb723562c5bbfa167a6e682c11207923de77999f805ef22facc3e68b741b1105949d0a2ea57fc96d2e387996b768e79a9164489d2fb307902ef75e78f7143e674e176715f009664a5e6f435b91a46015df15390433faf2cb6ea14299b43817d64ef9997e841b75daa901e724bab28d6dad88dd9ec4c650fa0b4f5651dee7b8ad5bc8929a8b10b8815a98a6f1601abb4c943547f077f3539dc04a615fb17a958099ff1b40ecbcc3a7ed0819b3e14b7c8da65d9f260df4c5d3f51fa6ec358148619e0f7581cb6ae2c7e7f179f7a637c89582aa7f00bf526eaa27cf21d29076c702179340accc57eef7af445eb9cd9004136fb8221e1d74948710200dca21051d967f9bf2cf2a994ef73e24f9a7dac016d643780614f1d30b1e0965453e2def53285e0e517c63844edde9021fb83de1246b45385d7c3e70af151"}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000280)={r7, 0x288ae327}) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="ffff73ff00000097bc0025000010"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54010001", @ANYRES16=r3, @ANYBLOB="000029bd7000fddbdf25140000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b00f67d00000600110007000000080015001f0000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b001e00000006001100feff000008001500090000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b00f40d0000060011000000000008001500180000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b00c76b0000060011000600000008001500060000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000100000008000b00050000000600110000f8000008001500d3000000"], 0x154}, 0x1, 0x0, 0x0, 0x48000}, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x0, @rc={0x1f, @fixed={[], 0x11}, 0x7}, @qipcrtr={0x2a, 0xffffffff, 0x7ffe}, @vsock={0x28, 0x0, 0xffffffff, @my=0x1}, 0x9, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0), 0x0, 0x401}) 10:29:39 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:39 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010013ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:39 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:39 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010026ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1166.641850] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 6.0 filesystem 10:29:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)="13d9e0539624ac5f6849dbc2dac7d214d8d86ea19ed5405fe9eb470757b05a6de27e0e", 0x23}, {&(0x7f0000000080)="29c179322fa6bc8e8e1dc95f75d5858ee15b74f7183e1f035984f3216cdd142eda81ea219d827ecaccc59f08725b5cc45d2022f4cd5b7548018f2df885ec26e2a0443fa303944cd1949559c378041bc2ef80ac2d2902026461", 0x59}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000100)="c4960001735c65", 0x7}], 0x4}, 0x4004000) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1166.698163] squashfs: SQUASHFS error: Please update your kernel 10:29:39 executing program 3: socket$inet6(0xa, 0x80000000000002, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0xffffff1f) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x12, &(0x7f0000000200), 0x4) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, @perf_bp={0x0}, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x151, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) close(r1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x17, 0x7, 0x6, 0x5, 0x50, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000240), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8000) 10:29:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:39 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f01002eff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:39 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:39 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010030ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:39 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1167.011605] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 7.0 filesystem [ 1167.048220] squashfs: SQUASHFS error: Please update your kernel [ 1167.173438] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 7.0 filesystem [ 1167.192473] squashfs: SQUASHFS error: Please update your kernel 10:29:39 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:39 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010031ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:39 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:39 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x94) [ 1167.335822] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 8.0 filesystem [ 1167.371898] squashfs: SQUASHFS error: Please update your kernel [ 1167.465397] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 8.0 filesystem [ 1167.487645] squashfs: SQUASHFS error: Please update your kernel 10:29:40 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010032ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x72}, {&(0x7f0000000280)="fe3df2bf2e00b16c7f6b731879ff0c9c51c9c1445ebeffbb135b5455a5921d44f263bc3c99ef5a853c6242582ed18e3194b7bd7bdb918e0712fb99d4a6414a0883569c0857598d60c8bc51c99ee4912e04e0839b39811ed254cfede8c977f23d02054bb31782a1e163e3220887ace046bcc2e5e4e32e6289394eee51b7c7fa476347e885643e506f6d0516533fd577c7423d81c52687082c74875f2f8a3d9ea64ca327dba2684a1a6c3371b5d987b440f6226e071adf41a06ad22b2dba4b98c3b8f84e2560440c2d0a8285c9ebd9c24ed0b0ed18e626a3f78b92b92617ccae0771bff3fdc9562bb22ac2adb15de126f6fdf6dfe6bfc09c894a57c2", 0xfb}, {&(0x7f0000000100)="e1935db4852500897920b744e32109921583cf7ebeea4021558be85bf82d239c5e1c0ffeeda2e2cf14520be290292c8ccc1e57669f3e2aec0cea528efa714f54c1e7b90881548b7deff452a772166b83b15914e4c7", 0x55}, {&(0x7f0000000380)="669571adf86ec49a08239f27638f82d13c2e4d9df4815077ffce8146599832f2157feed6f0e83fd23d24cc3823e22535eb2c46b23e56ac358aaf9b33804a9cc2331c2ef7a7957b1c58b29a3ad9fa7f98fc1d3c9b6f5cc186edb387e859fdd69373d29b4814c9de12c7ebbd75dcb2c00363251bd0696f010d2d2056c09bfe9e04dffa516c578dc24c0ff299816abde4d9f5a4d62a8877e7f9d08320d6776c5383c90703f9041fbe94b3417b8baad0659cc8ae60ddad8c91561cf5b6fde404868234f487904cadffccd934bb00ce5fa3b20e40e3ab605c60f4dc9d5db82f57bde6", 0xe0}], 0x4}, 0x0) 10:29:40 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:40 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000000)={0x7, 'veth1_to_team\x00', {0x40}, 0xff80}) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FLUSH_PMKSA(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x81) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="cf2100001000050700000000090000a6a372ef00"/36, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x40884}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2}, {}, {0xe}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@private2, @in=@multicast1, 0x4e20, 0x4, 0x4e23, 0x0, 0xa, 0x0, 0x20, 0x2, 0x0, r8}, {0x5, 0x3, 0x1, 0x52, 0x4, 0x5, 0x9, 0xfff}, {0x3, 0x9, 0x1000, 0x4000000}, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xfffffff9, 0x33}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x43}, 0x3507, 0x3, 0x2, 0x4, 0x80000000, 0x2, 0x5}}, 0xe8) 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df30100", 0x2b, 0x804, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0xfffffd40) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) syncfs(r0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1167.725567] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:40 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010033ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:40 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1167.777292] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 10.0 filesystem [ 1167.843031] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1167.856019] kauditd_printk_skb: 934 callbacks suppressed [ 1167.856032] audit: type=1326 audit(1607768980.311:178398): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1167.858409] squashfs: SQUASHFS error: Please update your kernel 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b9383bcd7c9b2c4b154cbe4cbf43408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote, 0xfffffffd}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x44, 0x0, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x401, 0xc0, 0x4, 0x2000000]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004801}, 0x4040805) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1167.865587] audit: type=1326 audit(1607768980.321:178399): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:40 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:40 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f010034ff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, &(0x7f0000000100), 0x2000000, &(0x7f0000000380)={[{@nosuiddir='nosuiddir'}], [{@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, '\'\'%\x0f+*#*'}}, {@obj_user={'obj_user'}}, {@context={'context', 0x3d, 'system_u'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}) quotactl(0x2000002, &(0x7f0000000040)='./file0\x00', 0xee00, &(0x7f0000000240)="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") sendmsg$unix(r0, &(0x7f0000000740)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000006c0)}, 0x8095) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffffe, 0x20000) [ 1167.976506] audit: type=1326 audit(1607768980.381:178400): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x40, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x9, 0x5}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x4, 0x8000, 0x20000f94}, &(0x7f0000000280)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x8}}, 0x10) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b1542649045f6df30100"/43, 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1168.050806] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 10.0 filesystem [ 1168.053246] audit: type=1326 audit(1607768980.381:178401): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1168.072964] squashfs: SQUASHFS error: Please update your kernel 10:29:40 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff1353ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:40 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000037040602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1168.208180] audit: type=1326 audit(1607768980.381:178402): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendto$inet6(r1, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x5, @remote}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x8, 0x4) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp1\x00', 0x4401, 0x0) 10:29:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='devices.list\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x21d1, 0x30, 0x10001, 0x1}, &(0x7f0000000080)=0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:40 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff2653ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1168.263795] audit: type=1326 audit(1607768980.381:178403): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1168.298205] audit: type=1326 audit(1607768980.381:178404): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_gettime(r2, &(0x7f0000000000)) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000031408002abd7000fedbdf250900020073797a3100000000080041007369770014003300697036677265746170300000000080000900020073797a31000000000800410072786500140033006272696467655f736c6176655f310000a3e01fda3736a9461a36f6f586bca8479b362cc26b823c137e2b88ec33094011b0438fc61eb4ac57220f52b1f6b0234f554222645475ea2ef462ca6ac97578ada62906e01e8699d1582495e40000"], 0x60}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000000) [ 1168.354409] audit: type=1326 audit(1607768980.381:178405): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:40 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff2e53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x41}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x32}}, 0x108, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='vxcan1\x00', 0x80, 0xbbf, 0x3}) [ 1168.420667] audit: type=1326 audit(1607768980.381:178406): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1168.461420] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 11.0 filesystem [ 1168.488786] squashfs: SQUASHFS error: Please update your kernel 10:29:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000180)="cf6de8132b51293cbcd1450fe65f75fa4245cc7713612312f013ab41e6a4b319e4d684453fcc93593b9b18f5850d2a88203337ac5c706f944bdcce3e1552a2e2ff8ac4a28a87450cf1a8541926d1b92fe944889f8f954599368c8bc7f7", 0x5d) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) chroot(&(0x7f00000003c0)='./file0\x00') setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0x80000000}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vim2m\x00', 0x2, 0x0) pread64(r1, &(0x7f00000002c0)=""/250, 0xfa, 0x40) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff3053ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80000000, 0x363302) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$uinput_user_dev(r4, &(0x7f00000001c0)={'syz0\x00', {0x7ed6, 0x1, 0x80, 0xf61}, 0x2d, [0x7, 0x0, 0xff, 0x1, 0x7, 0x0, 0x7, 0x401, 0x8, 0x5, 0x8, 0x80, 0x5, 0x2, 0x3, 0x3af, 0x3f, 0x0, 0x0, 0x2, 0xfffff801, 0xffffffff, 0xcf4, 0x8, 0x20, 0x0, 0x9, 0x3, 0x80000, 0x5a, 0x0, 0x0, 0x8, 0xf3b9, 0x8000, 0x1ff, 0xb8, 0x6, 0x2, 0x8, 0x6, 0xbc, 0x7fffffff, 0x5, 0x20, 0x1fc000, 0x6, 0x4, 0x81, 0x7, 0x7fffffff, 0x1ff, 0x7, 0x5, 0x8e, 0x48, 0xffff0000, 0x1, 0x21d, 0x1, 0x7, 0x2, 0x0, 0x7fffffff], [0x8000, 0xd4cf, 0x8, 0xdd1, 0x0, 0x0, 0x9, 0x6, 0x4b83, 0xf185, 0x200, 0x6, 0x3, 0x4, 0xae6, 0x7, 0x665, 0x5, 0x6, 0x3, 0x3f, 0x3ff, 0x2, 0x9, 0xef8bc1ac, 0x1f, 0x7, 0x7, 0x0, 0x4, 0xfffffff9, 0x9, 0x10000, 0x8, 0x3, 0x4, 0x5, 0x1, 0x2, 0x9, 0x401, 0x80, 0x2, 0x1, 0x7, 0xfd2d, 0x80000001, 0x7ff, 0x5, 0x8, 0x1, 0x7, 0x8, 0x2, 0x2, 0x4, 0x2, 0x7, 0x7, 0x8, 0xffff, 0x9, 0x3, 0x2], [0x2, 0x7f, 0x6, 0x1, 0xffffffff, 0x800, 0xab3, 0x9, 0x200, 0x10000, 0x4, 0x8, 0x81, 0x0, 0x1eb7, 0x800, 0xb23, 0x1, 0xffffff9c, 0x101, 0x7, 0x7, 0x200, 0x800, 0xf84e, 0x20000000, 0x6, 0x0, 0x3, 0xc31, 0x7ff, 0x1, 0x5, 0x616, 0x3, 0x2, 0x9, 0xfb, 0x80000001, 0x6, 0x0, 0x8, 0x80, 0x200, 0xff, 0x57, 0x124, 0xff, 0x9, 0x790d, 0x3, 0xc, 0x3, 0x6, 0x5, 0x101, 0x0, 0x2, 0x3ff, 0x3, 0x0, 0x9, 0x0, 0x1f], [0x9, 0x57, 0x0, 0x800, 0x7, 0xff, 0x9, 0x101, 0x9a, 0x5, 0x7, 0x8001, 0xffffffff, 0x401, 0x3fc, 0xffffffff, 0x3ff, 0xffffffff, 0x3, 0x10000, 0x6, 0x2, 0x26, 0x3, 0x0, 0xffffffff, 0x5, 0x3, 0x1, 0x3, 0x5, 0x1, 0x2, 0xfffffff7, 0x8, 0x7ff, 0x20000, 0x8, 0x9, 0x2, 0x7b5f, 0x3, 0xbc, 0x0, 0x7, 0x4, 0x2b2b, 0x0, 0x2, 0x6a8, 0x8, 0x7fffffff, 0xa3, 0x7ff, 0xffffffff, 0x9, 0x8, 0x8, 0x0, 0x3, 0x4, 0xed, 0x9, 0x6]}, 0x45c) [ 1168.510234] audit: type=1326 audit(1607768980.381:178407): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=3375 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1168.627353] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 11.0 filesystem [ 1168.641077] squashfs: SQUASHFS error: Please update your kernel 10:29:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff3153ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:41 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2c003, 0x0) bind$can_raw(r0, &(0x7f0000000180), 0x10) r1 = socket$inet6(0xa, 0xa, 0x20009) setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000001c0)) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)={0x118, r5, 0xa09, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10001}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0x74, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x2a, 0x3, "2a046b5cdb5c66728aeffc677c08d66e44ef0f8eb00b6af4c545e7eeb4dc89a8f0e2fe96692d"}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "82fcb9726699cd18da1789948aacdedb5e932d5212bc2ca40755"}}]}, @TIPC_NLA_MEDIA={0x34, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40000}, 0x20004810) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r5, 0xc29, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:29:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000050602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1168.845710] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff3253ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1168.908018] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:41 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000280)=""/253, &(0x7f0000000380)=0xfd) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x9, 0x82, 0x7f, 0x1, 0x7fffffff}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x80000000}, 0x8) 10:29:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000140)={0x2, 0x1, 0xd}) setuid(r4) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80, &(0x7f00000000c0)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@msize={'msize', 0x3d, 0x1}}, {@nodevmap='nodevmap'}, {@access_uid={'access', 0x3d, r4}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}]}}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff3353ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1169.047181] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16.0 filesystem [ 1169.070498] squashfs: SQUASHFS error: Please update your kernel 10:29:41 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote, 0x3}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @private=0xa010102}, {0x1, @random="b23449962638"}, 0x16, {0x2, 0x4e23, @multicast1}, 'veth0_vlan\x00'}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1169.199644] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16.0 filesystem [ 1169.217911] squashfs: SQUASHFS error: Please update your kernel 10:29:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ff3453ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff5bef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x400000004, &(0x7f0000fff000/0x1000)=nil, 0x2) 10:29:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800, 0x0, 0x2, 0x1}, 0x20) r1 = signalfd4(r0, &(0x7f0000000000)={[0x8]}, 0x8, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x2, 0x1, 0x22, 0x0, 0x400000000}, 0x20) dup3(r2, r1, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f00000017c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001780)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c200080a2a2dc7838167af0", @ANYRES16=r4, @ANYBLOB="00022dbd7000fedbdf250300000008000400c0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="ce7633fbca69a22a7670c2589d3a47b90000", @ANYRES16=r4, @ANYBLOB="000825bd7076fddbdf250300000008000500e000000108000400ac1414bb080005006409000000000500ac14141f08000500ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="43dd638c704a14e70000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf2508000000050001000100000014000600766c616e30000000000000000000000008000500e000000114000300ff020000000000000000000000000001"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="e0000000", @ANYRES16=r4, @ANYBLOB="000226bd7000fbdbdf250800000008000500ac14148c14000600677265746170300000000000e4ffffff2400070073797374656d5f753a6f626a6563745f723a696e69745f657865635f743a73300000000008000400000001012b00070073797374656d5f753a6f626a6563745f723a7379736c6f67645f7661725f72756e5f743a7330000005000100010000002f00070073797374656d5f753a6f626a6563745f723a73797374656d645f6e6f746966795f657865635f743a73300000140006000000000000000000000000000000000008000400ac1414bb"], 0xe0}, 0x1, 0x0, 0x0, 0x6f62370154d0502c}, 0x24040000) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r4, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0x24}, 0x1, 0x0, 0x0, 0x850}, 0x20000010) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @empty}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4000004) r5 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r5, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) prctl$PR_SET_FPEMU(0xa, 0x1) setsockopt$sock_int(r5, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef020001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1169.438360] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 17.0 filesystem [ 1169.458084] squashfs: SQUASHFS error: Please update your kernel 10:29:42 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:42 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e28, 0x0, @remote, 0xfffffffa}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) ioctl$CHAR_RAW_FRASET(r2, 0x1264, &(0x7f0000000180)=0x6) [ 1169.542866] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 17.0 filesystem [ 1169.581174] squashfs: SQUASHFS error: Please update your kernel 10:29:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0xff, 0x846) recvfrom$x25(r2, &(0x7f00000004c0)=""/126, 0x7e, 0x20, &(0x7f0000000540)={0x9, @remote={[], 0x0}}, 0x12) syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000080)="70b3be567ec2ef7b018e982cfd9e4060dbf0b3f891591af6205f1178a46b84b5dfa3216a5d8830b75bd0271d9ffefc6e2353afe6482cf17e96d513f896de738a3607dfefee58d19bf7125a5647e8bdcfb1b7366c233d23d8a5b7b6edfd7ac6e0f30a3a4ee7087afc8ead287fa9f7ceb455876138b67c419e36441868c3b31df16c5687153acf55096c", 0x89, 0x6}, {&(0x7f00000001c0)="9c8a31ae6ab46b15c05a0700a3c7bb8b669a6137d3f345ce89eb038c6921bdd1a25c9082d238b734ddb7d331db3773462ad3b6d8eed28013a5063e48eb9de54420748752b9e9d4ca330d442511b85fa45e3c8e8018b79b9664c9155813803b0215dec2e0c3b485b02e69dc84cab5ed9334917faf96f8a02be2e421e92171a6b4dbe154f795e291f422d71c", 0x8b, 0x6}, {&(0x7f0000000280)="3febe07423c137f2f82a6079be97077c5ec1516d1e8e29315737a3d973980fbe2040e49ed3b69f6db1f3c1e49674e4bc59a38d02c94998455eab637a7516ddd18f4724c8301cda4b192e66154b846fe8639eea2c83ce448d8f0854a0b9c9543f55d942349638900f78928d2f0cc9978bb2c5567f334609d3f500c50699d9c6c2d477f97d98f3e14973414778afa2b3bc50a130743fc41092850186c6f7763d9fec9faa7880d122503c439bbc598e4d751c7273563afa65a6728d8885764158057125e2b51d22352e5f9c9f24f7f219ef1464d33e3d2945", 0xd7, 0x9}], 0x4, &(0x7f0000000400)={[{'$*[[}'}, {'(&:'}, {}], [{@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@dont_appraise='dont_appraise'}]}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000140)) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef030001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:42 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:42 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef040001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x2, 0x70bd27, 0x25dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000000)) 10:29:42 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x600143, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x184, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7e, 0x13}}}}, [@NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "0886ffacd3da9120a0e704b5b4a43adccb7d9c7b61a99357"}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "89fcea7f16f9eceaf72f4d5796b50bacf190a9a61b8782c4"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "3c1c514b7856212d7a5776232efa01cc9154702499986104"}], @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x18, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x4}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "81eac3cb6cabb9f71b2b64f7f691f2fc7919529a12315094"}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "951599698ed4d907b282676b1b7e7248822d9e00080a5455"}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "aa18a0df579a379fabf033fb7f8660218f6ed79a12578a71"}, @NL80211_ATTR_MNTR_FLAGS={0x1c, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}]}], @NL80211_ATTR_4ADDR={0x5}]}, 0x184}, 0x1, 0x0, 0x0, 0x800}, 0x2004c044) r1 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r1, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x9d7f, 0x280c0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000001c0)={0x7fff, 'syz1\x00'}) 10:29:42 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1169.830149] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 18.0 filesystem [ 1169.861832] squashfs: SQUASHFS error: Please update your kernel 10:29:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef050001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:42 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) socketpair(0x26, 0x2, 0x400, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000480)=0x1c) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ubi_ctrl\x00', 0x460ac1, 0x0) ioctl$BTRFS_IOC_SYNC(r6, 0x9408, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="05000000000000000000060000000800030057a0b17975874b99f6e7846172605a051c519adcafb98e16e1c4b01c144f52ecddea1079b918a641241e7a6ca9e1997b38da00"/84, @ANYRES32=r5, @ANYBLOB="0800050002000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000740)=ANY=[@ANYBLOB="c80000009741e74fbcd8595c92b875695444fb51b6bfdfe15833ba4171fa3c7448f8211cad8c9492b26970ba9de7ec6bc5360eee257118917ea1625b064c8f759ed88f85cfd1f649f2d17159cd99b1f8b88a0694c8d51c0cd89b0f7b0b1ddb540ed091298773a9c7e3c69d7fd288405bb07ee83a43da1b94be614f152f8df3cc743fa26cdaea2a8011de77655c0a84280e525a108658dfd41561ca587aea008d0d00231190ebe3091a1222673175d6be764bd64d00a9d73257f51724392ea627e5c703dd7a444c51d8101adaee60e60813f119c2bd34208fdeb3cb1fae1b654e0fe2c53df1bd416dcc386900a081", @ANYRES16=0x0, @ANYBLOB="28072bbd7000fbdbdf25250000000800030020c5992f73f017be26fae849925f9e47089034433738e1188fce6ad91a3c9550463c33c07e67cf1bd0ed47950be45961fd170cb5e12e2d50286e74a44e9be362e7af", @ANYRES32=r5, @ANYBLOB="0c00990003000000040000000a00340001010101010100001100070004a04195497f9c81abdea0a5890000000400280004000b00110007002ceb0123818c2f8b4f1ac903b300000004002800090007000b25c846090000000800090001ac0f00040028000a0006000802110000000000000a00060008021100000100002300340031782ad58148d62297dc77e3843680145b63d781ac1c86fc35402219a5b96e0090b7a6bbbd93de"], 0xc8}, 0x1, 0x0, 0x0, 0x8011}, 0x808) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x80a01, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r7, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f0000000940)={0x2ac, r4, 0x20, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x277, 0x33, @data_frame={@qos_ht={{{@type10={{0x0, 0x2, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1}, {0xe0}, @random="e05df667cad6", @broadcast, @device_b, {0xb, 0x3}}, {0x8, 0x0, 0x3, 0x0, 0x81}}, {@type11={{0x0, 0x2, 0xd, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x62}, @device_b, @broadcast, @random="bfc6567e6e1c", {0x6, 0xffc}}, {0xc, 0x0, 0x2, 0x1, 0x8}}}, @ver_80211n={0x0, 0x1, 0x3, 0x2, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1}}, @random="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"}}]}, 0x2ac}, 0x1, 0x0, 0x0, 0x800}, 0x4001) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) socket$inet6(0xa, 0x4, 0x2) [ 1169.955863] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 18.0 filesystem [ 1170.003028] squashfs: SQUASHFS error: Please update your kernel 10:29:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000880)={0x0, 0x73b2c2af, @start={0x0, 0x1, "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", "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"}, [0xffffffffffffffff, 0xff, 0x2, 0x1ff, 0x7, 0x2, 0x14d0200000000000, 0x4, 0x7, 0x2, 0x0, 0x3b, 0x0, 0x27a9, 0x4, 0x80000001, 0x80, 0x6, 0x100000000, 0x10001, 0x4, 0x80000000, 0xdd, 0x1, 0x1, 0x300000000000, 0x400, 0x2, 0x9, 0x8, 0x3, 0x2, 0x800, 0xda, 0x6, 0x401, 0x800, 0x1, 0x8, 0x0, 0x1778, 0x6, 0x200, 0x0, 0x800, 0x168a, 0x3, 0xffff, 0x5, 0x101, 0x5fe4, 0x0, 0x1, 0x2, 0x7, 0x0, 0x9, 0xffffffffffffff3f, 0xef, 0x1, 0x0, 0x101, 0xa4, 0x243]}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000001c0)={r2, 0x100000001, 0x3, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_destroy(0x0) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef060001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:42 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d000020004000000260100000000000d0602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:42 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = getpid() tkill(r1, 0x2f) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000b00000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000400)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r3, 0x2, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xcb04, 0x16}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x8c, r3, 0x10, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY={0x38, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "4cd86fe869310da990e1799c30"}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_TYPE={0x8}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_TYPES={0x4}, @NL80211_KEY_TYPE={0x8, 0x7, 0x1}]}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10000}, 0x4006080) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xa3, 0x1, 0x1f, 0x7, 0x0, 0x1000, 0x2228, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x96, 0x2, @perf_config_ext={0x9, 0x8}, 0x801, 0x0, 0x24, 0x4, 0x4, 0xffff, 0x81}, r1, 0x0, 0xffffffffffffffff, 0x0) 10:29:42 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0xc0, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000280)=""/192}, &(0x7f0000000340)=0x78) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef070001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000c77000/0x2000)=nil, 0x7) write$tcp_congestion(r1, &(0x7f0000000000)='bbr\x00', 0x4) 10:29:42 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1170.308464] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 19.0 filesystem [ 1170.389472] squashfs: SQUASHFS error: Please update your kernel 10:29:42 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = dup3(r0, r0, 0x80000) sendto$inet6(r1, &(0x7f0000000100)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a4879f8a5fdea74c8d170a9628a717dfd6d43fcd7a250a5370001b2623b412b9db2022649045f6df311", 0x49, 0x4008084, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)="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", 0x137}], 0x1}, 0x0) 10:29:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef080001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1170.488984] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 19.0 filesystem [ 1170.526130] squashfs: SQUASHFS error: Please update your kernel 10:29:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:43 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000040), 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4) msgctl$IPC_RMID(0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xc0000, 0x0) sendmmsg$alg(r2, &(0x7f00000016c0)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="d98e82a1bf8d08a5d461a2be07a9c322e10d3d36affc5a53a46a0a5d4d8def64238546425ead37db948c3398b2782c1a3be11c1e083d22a9", 0x38}, {&(0x7f0000001100)="3c0b1dd58acc809436aa755a0090cd79007bd097e30e11d6760960800e9cfdf617dd356c87f77dbe0ac592cbd42fcf6477d99e056f8f6198ac190672167c6126c42ce506a87481a2b6c6665ba474140591f5df93d887757f390bf8242cc01975b364e929217b", 0x66}, {&(0x7f0000001180)="86b9daa9e4668c64ebf80b3bffd0cecf32f3906985c35ad44f7c422cd3e9e0a7bd18954325389d4f4943f0a2606ef4b116f40a4cae5ef7107f4983dcb16cd631a9d01ce84fef94249917acc7330f47dddf2027c091046b7460ff80c88d10d3344a5cc1", 0x63}, {&(0x7f0000001200)="db7ae49db1472f44a0d2e3a5c066178a84705c8f1a026f8961d5240f24aa4a297deb9f6f23d26e9a3a8ccbdfe6c70c2c709606e2e46812e8a85bf0d08c495d42c0f5d8df08053ca64590ae9c4c9bd267c6ddf1197a9d5c1384f2734d279df60ac42eb30b74", 0x65}, {&(0x7f0000001280)="6925986524c344c5d638e5d5d8bbda69f0c1bf0b64ec5832b30b83395a493a3973e838f8c2c775aaec11e01254ce1b8edc4d98e7d96ea7a7a5c8226acfab70e8df71e7c675ec86af27f43bd948e3ab93a7bd6364eb1a2cb1a6cc541d2edd0e1d04d7b85959075a8b60fb047511e3af862062", 0x72}, {&(0x7f0000001300)="bb2397578bf081b1c607fc5090ae4abe68810c4220559b87b85dcbd86c939f7337024c84cf3eaa8efc5b7d3b15e4e8b71ef9ecd7008f96217b9bf7683adae84a6eca161bc42d41432a3dd6d7f80f82288becb94a5265", 0x56}, {&(0x7f0000001380)="251b6741da224560aee8d98ec715de9e095576daaa7aad4f34f84b907a0c17e194bf47041eb74220fc7526ce86b43c5baa994a34efcda1cb08006811bca26f98f930b4c8d3cf40b950775d88b111ef149df7", 0x52}, {&(0x7f0000001400)="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", 0xfe}, {&(0x7f0000001500)="974ce5c10e636a957901fc455379ca8b2b113640b3479e315e01cc0f5f1ebaab2eccba5ccb9b825b14527664e57733d5b6ec8030cc728d7203db3992548b0a2876df6a92230bd56cfb2341360500cb27c2d29a2f5df80c0ca401ddd19a0cc300db73780870fd682e676927357c5712346798be7a616e2544c513155a05479ec0767a52f503ac086144821a30e9fd6f4b3e34a9a22975f17a5de57fe913dd5388808668b79140965463e9080af27e4385a05890234d171cbf77", 0xb9}], 0xa, &(0x7f0000001680)=[@assoc={0x18, 0x117, 0x4, 0xfffffeb7}], 0x18, 0x20000000}], 0x1, 0x400c0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000001700)='trusted.overlay.upper\x00', &(0x7f0000001740)={0x0, 0xfb, 0x10f, 0x2, 0x80, "086fdb0185a76afb68554041b42ae33e", "6b0b523ec5dcb0c4a30c40575dc4899d6ab7c5898d73bb78680fcc0e7c22fa65c8afb74a7c6aed2477ac2c9b457c6ed8f762f762d452476e5054d561cef64d9d93f96272dbddfd64707288857ec16885e44036642e40685f86aa48381e41ec452c05f6dc6c9c9fe38754677d19e63b920424691b4dc678cf4e343b51830ea809137030cafaab2bc0dfbdf85759c3118266957a43922ac1a53c326d401eed59c26596b824ae6730ecb99959c0d51297a311de64e1b7038faf5381b76042b40650cad479ed3309efd7575f878710c4c0db6de316c7d6092deb87a493b056da46216b876065a068b25d4ba7eac872d2b404bb79c5a78711c02846e3"}, 0x10f, 0x0) 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef090001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:43 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0xb2) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef0a0001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1170.670383] nla_parse: 3 callbacks suppressed [ 1170.670392] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:43 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1170.858508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef0f0001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:43 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x1, 0x7, 0x801, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_FLAGS={0x8}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}}, 0x20000000) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:43 executing program 0: ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x8, 'nr0\x00', {'vlan1\x00'}, 0x3942}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast2, @in=@empty}}, {{@in=@multicast2}, 0x0, @in=@private}}, &(0x7f0000000140)=0xe8) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)) semctl$SETVAL(0x0, 0x3, 0x10, &(0x7f0000000000)=0x76d6) [ 1170.910529] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 20.0 filesystem [ 1170.930661] squashfs: SQUASHFS error: Please update your kernel 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef100001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1171.093952] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 20.0 filesystem [ 1171.113790] squashfs: SQUASHFS error: Please update your kernel 10:29:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:43 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:43 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') 10:29:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYRESHEX], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) r6 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$vga_arbiter(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="616f636b20697f00"], 0x8) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef130001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002001500000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1171.250148] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef140001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:43 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000130602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1171.302242] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 21.0 filesystem [ 1171.332225] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1171.368522] squashfs: SQUASHFS error: Please update your kernel 10:29:43 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3, 0x2c0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/156, &(0x7f0000000100)=0x9c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:43 executing program 3: r0 = socket$inet6(0xa, 0xa, 0x4) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) ioctl$CHAR_RAW_SECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000001c0)) timer_create(0x5, &(0x7f0000000000)={0x0, 0x3c, 0x2}, &(0x7f0000000180)) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendto$inet6(r1, &(0x7f0000000400)="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", 0x20d, 0x20000000, &(0x7f00000003c0)={0xa, 0x4e24, 0x2, @private2, 0xc22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000040), 0x1) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000640)=0x3) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) sched_setparam(0xffffffffffffffff, &(0x7f0000000280)=0x3ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000380)=0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$netrom(r3, &(0x7f00000002c0)={{0x3, @default}, [@rose, @netrom, @bcast, @remote, @null, @remote, @default, @default]}, &(0x7f0000000340)=0x48) 10:29:43 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef230001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:43 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1171.485964] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 21.0 filesystem [ 1171.525992] squashfs: SQUASHFS error: Please update your kernel 10:29:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) sendto$unix(r0, &(0x7f0000000000)="99b386c773e98e3da0aa47de0da492c07b7b241877ecbe92057ff602bb98bc57ad82a65ac42c0de4c7af85fd", 0x2c, 0x40000004, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800de00100096b48b12f7d756ffffffff730507", @ANYRES32=r6, @ANYBLOB="6800e5ffe900000000000000020000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r3, 0x5000940a, &(0x7f0000000880)={{r0}, "5490833af9101a24f7fcce00d59b2ff15f3a6e94331febb8258cbd920b7ae86fef7fcd930dffc1d8ce517643258cacef4e0dd6bcd5900e3cbab75fa0c98cc4b80ea5b0429ae317a5ee66d25e641a9d3dc2261ecd15de468469d6718c73998d6ca602ed5950cab3afed7602bd7254d844913cbe2c281ab2a19d77262ef84b0ed1ece5ca065a2d303a3190caedd1a9604648ba4a9c8e0ddf611ce1175efac1bea0947a71294cb10787bb8e8aed2c1662b0fc28c24ec088f1a81d55daa184dd358c38b29949db0ae5b63a676d26e0aa26b16e0942e6cf58b81fbeebeed72b19813e48b2d8b24c099af33f42c00cddfe381b8058d175dfb39ba3a8e16e02b3efca7cca8649cb6fb574e2940f08db671c855c863264a745664801bf3167ee378784c9fe555245f1078889eb349709b2a3869e13525b7ba19a275a5f6e05c714470f37434529f5f7b66a1179ecc6627a282485f637cfc20608068b4244468b92543d4f41a4d268007fa45d496624445dd8da9cc2fe2e453c9fbb3ad0a8e7dd316d6337189028a12d5dc992c275b2c2bbbd58d63501d0dd945a9ef5d888de8f49f9e5ebb36a776e5d0b0af8c7135efe999a87a3817ca2a0c77166878e117fb1a05231351abaf4683b1eb2308db04f1dd068c7fc7163c8a06dab6ab70440e1e79d35b42f4d74c061d41900075db34234d16ed051d4f39677ba5767ac88435c9052036bfd9854668aed278b84cb9b25c18a4a732d7cfc8d8b93d855e2d9633f1fca631ae2cca554c3cb64382a10e6e2221286be033fa5535a53c3c82359adf925e16129f186aaf713c85f73a0c3ca192f095b076ad328f0985f1605edc31f85a475171979167971c8d2212dfd8811441c26c1459d8ab0390588eb37cae906f830bf4547c91b90913b45fe778a8b47eb0d6add5db245ef4dfd313b99844921167b4e8076677be5436ac0ac008c5caae742aae636a812d2388d4da48f74ce38a0d29726072da56fd6f36a7b2053fe91cef2057996c372d8e71d82eec04fa8b3df4768df39b3e23c6a23cd9de69c47ce2db290fe7cfce998114f6eb47b1de875113df68f0e65cc451ce329c1de223b123188a7b5b468255ba32712decfa8d9a63ca99fc0d7ace015466896798e9049468920c9f11589ec0f8c231c8483f615ffbe0e3b94c506b61757a064edb707661ab9d623197ca9495820d6c664031b8231cccd1ed3d8d2f01cf3604dd3f999fdcbfaecc0fa739fab7a20b72f1b22ed2ff0ff7ca3ab8b44f2ddf62b0c107522fe8110abd446e45a1b760c33d66d58d7f8900f00557914a1f76fe444b39c4d1371108491a473066c9e4ba74a73c63743d0a3367997e836784ce43a380cf101d9dbf37dfdaa71c2c92cd3b5139226b5f1fbe66fff6069b1af549a7a157a4c8082c55a759b05c1b56eb4b21afe7d6b93be24255e77ac76e92f6661076e5a78ac42304773aad77d3290e26ee6e4548f496d34bac3d1dbd9eace2219c3df46c40e5c5928c40d1267bc480fa8b5b414003092d02b2d26567d2162feac70613d1c8be1aa58338f7c0be599fa4d8f11f7cc9a3f4bc2ab0cda8f1615feb0e30dfe52e8cfb6a7f35717920154cf7da88638a3b5d2fc3debc54fdbdc3f44003eeb1b684633d41112110262aecae9453849eed434ced0f8a6f20cfd376b05138ad492490d1ca111c0185b5de3e8c9e807435bb98a1032f6b4f9a8bdec1ce510147a6ca1c4c05415bf5d3adc85c12886e9c22443bcebe0d4233d43f13bde59bd0ffa110ab04138e6f4d9ddbd1cf79ea198ac5114d1caa4dcd6c31b7b283154f81ddaaa7ef7f0690c68085ee31efb019fee5413eaed7b7ad1190bd1deabd8ffb861505f75e247ff03adc94b719c5ca70a3646cd0614b71038702cec4b1a9f8579cb8252fa9c7761fedebe25d27a0afa0ffcde15b83a7456bc95291e8b71b1df1730b8d3d6efd5517c4b53c28ef73b70a1d8f5eccefbc176f3519317ee3fe16916e63effc733ff19865eb4b76464c84ed1245a6f9f5f5b32921f4ea5c76965e240e59c37a6dc9ae98acec90b89a781c325ea513896658f4e6ededfeb332fd404bd485516545288dc2de274f31b5d979706c843968e8ff3b053926308c521779f1eb1f6d39965bb6cf17ff783274b565566f0e5686ae2a8d247e64953f25f136682e64c499e2842da286d7a3621e8c77cfb4391a1e2c1c8949f85fff0955b6be03bd7fa4615c4c86ef7cfc37c94a8d7acb4ccf4771566dd2e6e030d33fd21f0f7211fb1934d89d91185d376eda1bacf519f7849eee5b9c19dbf758a340e01e16c017e5657c1fa6bbcca666da7511c5320c5fb85481c442390154e262cac5c1a5534801ebafb2b54ea3a0063fad4374e8a1fcafa3f3059032a46adb432d8c76275bf326277fb8009b466219c5a8b6163b27152dd68d1e5285d9496a958219ea531a633e8a320661b3641c5f672ed87fe52ac4481f8cc274fc5c8f33250cf5ba298d5f2e4acdcc26404c36594c5b78f0abdd7689fcb076836b312e38bf5bb92516adf3a832e758684ba925f42a636da29fb6ec54105d3af5b398f221638223eced89076af3265a215de54fcc0dc755684f1cafdfb3e0200a49d923512b5b7720295bbafddfe28569fc42248e1cb4ff4bf9290ce70c664182eb6e749eff216d30ec86e7a23c8e6d622ce05c7d36d530a02805a569141443c753cd5d5384b532a1c0c82165bfa2a6443263ddf9a98c80903248c7b4d25ceb23b8d5a66edaf1573bdc856a21cf5dca7ba020905d286ace3c271719d471ab270d6c649904027cb3c407be32a25b357a637a5a9e85837505d0f460a9c20b69ee2dc0f88d4dde5b1cff11438eb44482bcb40d5247caa97b498aa73bc3062830b38f4f724120b5c2e1c714ba2749f45a8a251c082dcee149c3d56775430731a9405d4f299724b75d50bdfe644c3dc96585c8c891c04153196bad5d4a0d40c3ec258536970b70586fdedf6a2a3c0d094a4bd6d961c8ab83a010ec76885a01748e0d129e7ab6c9bd32a635b4278dc170feea7f35723627f11dadd4f0a0cff1b0689af6ac25304b869c8bfeb3e57559ca6050dab6d0b9951ccf32bd6d1d8768d71610892b22a4b1397b9b90025433e0e9bafa8c4c160d0548f69e5c55d41a09102ae9e447a77933ae1888d4fc4efc8f408151d2ca02db63892441f5c0677687242f87b364df4d01405946ab244c629571be2f2cc1610ebcfb21d005a11df332b74a22ff68783d8af835e160d69a51ea85d0315ec5b18c06c96be92cfe39d80dc712bd000e6572b3410b3416efdaa3cd39480af3c16b790e438fdd45d8c2bc5bca8bda722547c4e54e58d3853aac68481e900265d17cf057dbc1607aacd0b428cd8fdda708079a77f74cc5278a7a209cf8dce648bbb46ed12d2ae545fc908bae2ebbf4ae08279399ba24fa8b5e080bb3281a89f8dbfbf14e02ec04cb1b53b53939ea7aaaa3da21e4e093ff5c09180b675b5c700cdb5fa0b16638c794b91f3b40573b3dd5eab0a50c36b6278ad33d7646977d8d16c4a414b008dec8b0daa1a810939458b5a027565028bbc602bde1cd3639ca63ba2742c8e68dd0f988e3fc0144e25ce1d80277dfd9ae425dac9b0b3fb28081b5d31ff8c555f5c6621887e07ed395acedadc36eb59e838d3ff0eb30dc23434176275a9ceb063846dc3877999caf372765cbfc4eb95769507eee996786f0de774fe7d46d127e5097d37ac0fdb28088d21f51d8129da62acd987524d41ab88347a4e9af25c68bc1bb123c9cdd716236392a256252d9263e8dd8e3aa38de4513a474bd3fc878e6b315d247d56b58df9f4d9fc09fd76c49ade1bb6ef54760ce8375c1440c6c85b584f17075d463298fe5587f0e7792196df41c6e7bbc46d0bc4f31aa634820e8a619d48b282ba32f36bf2264393c04ef9b5c94dd7c965ffb7270f46f0f8669bc732f6b792310355aa44c4a539eeccbf4026229710bed27dcfb0fece92dee0f8d28d04c9eb380a5144fdd7a760d7a993c637e7eab6e57846fbf54f77fb7b09ed23ec2c573005851b7f042caf4eaf697ae3b6f7ef20084ea2f0e6d5654372cfafba4793966100c9c9a4e3af176b85001f81aa44208aa1522e83860ba30d5036429671203ea86bf0ce1e1cb3047b35f21d9178705d20207309abaaa313ceb90eb612ca60bd3a1a6668498d0fe26aa04f4bdc73f86ab0cf43da3676fa1b3713d802f481b0e6c683fb9702e4e511cc94ba6e47cf25a190ae004f0226cdba13ac2e6634688d9525b1c37f4ff6833efb29adbcaa2db046fe92037665741392b30253d42f277516ff8d05b99256ceb9f12e9a84e9d172eb7724b2baca600cc572eee9d7d6a3b29be2a1b287824264dc2c3ee931bb3def7d771e0f6fbabcd6a813aa18f593542373f86000f950353bdad2fdf16eefafa88d820e21587f1cab6852c3dcf8e2c0c5907e5fc863f116b4f3e56af0cd4a9f6d6e5f12b3c4f2acff0c486a11567edd1065a809a83f68dd55e67f443c902bcf441f4d5b78b3025234167a2504a28016e634e499ba3efd1d20ffd392a4a42ca7d24fa7d192d57631020d60b0727630e5f03016c0aa6ce2c397ef38b83db364a05a383914c5a620365f34acbff0222b6381486a5d86167266b8701138dac0ca1c451bd0c93ea8d08a3ecf11f7b13c27dc8ad5c354479070594e109bb078176f0e432b05540311a1cab2e3fab8f7f5dc39e97949be564ab820e7fcadec107fb617699a56a70ebd4b765d0b10ae4c73925886a100315102daade2193bd4f912aa5da2fb3c5d5fb7205f7c2cd33898b9a1e5663bbe8664cb9d44c2e4561e821c1e0458d54e50dd9713efe446d2c662c25b4f6858a66964f8c2c95360e4f2fdd88d66c7c64b204fa435b85550628831607c57277524d277f8b72e0283c6e49fe8597805063c333cab25d3836472a3425febc03e344f709a36b926486d9361cff32075057bd268ef2df2ee66a5406ffbd42584df02a329e2e3c2d33bdb6a9fdc829b9cc0a169de6731c0167a872920efec8b2ada803636328835df6da86f60428daf20463ba4062f7e066a74852474b36c981ff40aaf00ec05f687db7e77b4263ec502da7928490e587085dafaa9db5244e744ad8f4b19265eb4ceb45834be6bf7a0439f843403a7b676ee40961b8fa9293a1f73a1884117f20eef186d5b6ebd828a13d1de5f71402e2ba90935d340f659bfd0a03a7600d860da77cb1184bbf71eff4acce077b6d91fb49871670bfde7912cb0d9c0274b199fd97093274d53f6200f25e5a984462bf61563965446a2dc81a91e08836605962dc1d9c769ce63718dfe592e9d4703358de3b93390d8a5b74dd131dbae847aa7570a47d5e5e97c0026a36aa42c5e1cdce436f6eab5006f415d9881d0a53b231d654fe1164d19cdc41b945e798152c90ca8b938edcd59e1d77373a0515cfb4e7312419e59ad3e6128170df3572d1e74a70c3c56bc883e68d752a2464a45d7af6081bf29f5eb33839c1d612d607d588ac1f7e9f29ec650e6fa92d32a1862d87b94180fc5fedb4794a618377d4a79f68b53b8bdc0d2132552649abb738c1a9db6bcf94e12a6b621e4bfad70296af6e285be23d73782dcc0d12e8a7785eccc12c8b8b3cc97b2ad3b040f92efceab151d87033aff569d665fe60c98067661a330e811c83bd848ed73c9bffa8601f456d4439ca91ca620992f3125ccdc66b1d506abfbf75636191783d67d44b499f826ced31fdd0f5f98376e1bdc7d7ecadfc9fed6159412397ab0999f"}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:44 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef2e0001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:44 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = fcntl$dupfd(r4, 0x0, r2) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000000)={r8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000001c0)={r8, 0x4, 0x30}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$sock_TIOCOUTQ(r9, 0x5411, &(0x7f0000000180)) write$snapshot(r3, &(0x7f0000000280)="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", 0x1000) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:44 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:44 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef440001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x8000, 0x3, [], &(0x7f0000000040)=0x5}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:44 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40c940, 0x0) ppoll(&(0x7f0000000180)=[{r0, 0x20}, {r1, 0xc0c0}, {r0, 0x2000}, {r0, 0x254}, {r0, 0x100}, {r0, 0x4042}, {r0, 0x12}, {r0, 0x2008}], 0x8, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000280)={[0x6]}, 0x8) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1171.816276] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 25.0 filesystem [ 1171.847573] squashfs: SQUASHFS error: Please update your kernel [ 1171.937307] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 25.0 filesystem 10:29:44 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef5b0001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xc00200) get_mempolicy(0x0, &(0x7f0000000000), 0x8f, &(0x7f0000ffe000/0x2000)=nil, 0x4) sync() 10:29:44 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1171.988609] squashfs: SQUASHFS error: Please update your kernel 10:29:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:44 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x4000090) 10:29:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:44 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef000301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:44 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:44 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef810301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vim2m\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) 10:29:44 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1172.312561] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 29.0 filesystem [ 1172.346349] squashfs: SQUASHFS error: Please update your kernel 10:29:44 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x3, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, r4, 0x85, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x7}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8840) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1172.413840] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:44 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:44 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef820301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1172.461138] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 29.0 filesystem [ 1172.485378] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1172.500441] squashfs: SQUASHFS error: Please update your kernel 10:29:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x2, @mcast1, 0x1f}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000500)={0x0, 0x5, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000580)={r5, 0x800}, &(0x7f00000005c0)=0x8) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r1, 0xc01864b0, &(0x7f0000000440)={0x80000000, 0x101, 0x8, 0x2, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x42, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000100)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xd, &(0x7f0000000880)=ANY=[@ANYBLOB="180000000100000000200000950600002134fcff100000001f1c0700000000001581396aca7ed7183a75183400000240000000000000000900009500000083d13309000000000000000021ee", @ANYRES32=r1, @ANYBLOB="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"/297], &(0x7f0000000140)='GPL\x00', 0x1, 0xd9, &(0x7f00000001c0)=""/217, 0x41100, 0xf, [], r2, 0x0, r4, 0x8, &(0x7f0000000340)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x7, 0x1000, 0xd1}, 0x10, 0x156a5}, 0x78) 10:29:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:45 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) fchmod(r0, 0xa) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x5, 0x4) 10:29:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002002100000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef830301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:45 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x848204}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x801c851) write(r3, &(0x7f0000000240)="aa3b61eb00e42274366d0b8cfe65906f9e3422b69bd29cf287d2ae09981bf022c9379fb9b3d0ef70874552a6638b9b7b315a3ab1294523996803474941ad19ab5468faefa208c1aea181d424e3d00a5827b48bb125c7ae3e2299ca07273f9bbf2cf2e12bc8299f7a63b4c0b2f2c4d133ec8256147864b5b4030d54fa92453b7bc390b8e12c0d98dad27073e3", 0x8c) 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef840301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1172.760791] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 10:29:45 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_wait(r2, &(0x7f0000000100)=[{}, {}], 0x2, 0x7) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000180)={0x3, 'erspan0\x00', {0x2}, 0x4}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="888fae57fa98e94d63e4a902bfe127d3e688c82fefa75cc502fc889d44222676a0f6b2d53a3f", 0x26}], 0x1}, 0x0) [ 1172.837215] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 33.0 filesystem 10:29:45 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1172.891303] squashfs: SQUASHFS error: Please update your kernel [ 1172.900502] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1172.930157] kauditd_printk_skb: 976 callbacks suppressed 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef930301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmod(r0, 0x114) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000040)={'syztnl1\x00', r6, 0x8028, 0x20, 0xe63, 0xffffff01, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x68, 0x0, 0x1, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, {[@ra={0x94, 0x4}, @generic={0xdd, 0x3, '>'}]}}}}}) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) [ 1172.930167] audit: type=1326 audit(1607768985.382:179384): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4009 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x45dfc7 code=0x7ffc0000 10:29:45 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1173.008320] audit: type=1326 audit(1607768985.422:179385): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1173.031660] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1173.055810] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 33.0 filesystem [ 1173.083732] squashfs: SQUASHFS error: Please update your kernel [ 1173.091954] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1173.117007] audit: type=1326 audit(1607768985.422:179386): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:45 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, &(0x7f0000000000)) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efdc0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) clock_nanosleep(0x3, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000000c0)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000080)={0x2, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x68, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x80000001, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x400c0d0) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:45 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1173.153177] audit: type=1326 audit(1607768985.432:179387): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1173.179564] audit: type=1326 audit(1607768985.432:179388): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1173.241573] audit: type=1326 audit(1607768985.432:179389): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x2, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efdd0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:45 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x10, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_RESULT={0x8}]}]}}]}, 0x40}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80030}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x148, 0x12, 0x400, 0x70bd27, 0x25dfdbfe, {0x2c, 0x40, 0x7, 0x1, {0x4e20, 0x4e22, [0xffffffff, 0x0, 0x4, 0x7], [0x0, 0x3ff, 0x5, 0x7], r5, [0x620a8861, 0x8]}, 0x7f, 0xfffffff8}, [@INET_DIAG_REQ_BYTECODE={0xab, 0x1, "10dfe6211086e5e32c004b8337d9b1259d2d053e6198f1d52e60b469af68ae9b52de16509bc17dbf12e95723b1d64e5e546b3a3b3802e661b66bbb78cd338e75bd7c8cfbc6a612d5f2fd205b1c8989ad92ae7ffe85dc2dfba4776c5058b1bb8b4a4df50cf0041d38a428b4a1c7eca0590086d56f3649c19c1eaabe20918ffb9f039e411e2aa066fc9e079762a65eebf1009f4280cb1f38d3aea8a9ae18e77e4c7417952e3534f2"}, @INET_DIAG_REQ_BYTECODE={0x50, 0x1, "871a96758c0270d633b07b5d9d3bb27ea17417c2488a0c3dcb6d7961f61376f712d15eaecb895bbed204d8e83c3293212a2e2c487a42bfa2cc6b26ba54f0991b5f06feb2aa91edc4e8b0ad56"}]}, 0x148}, 0x1, 0x0, 0x0, 0x20000040}, 0x8080) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3cb4c3408c3aa8a045f6df30100"/35, 0x23, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xfffffffd}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1173.319862] audit: type=1326 audit(1607768985.432:179390): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1173.351459] audit: type=1326 audit(1607768985.432:179391): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1173.402593] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efde0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:45 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efdf0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1173.440677] audit: type=1326 audit(1607768985.432:179392): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:45 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendto$inet6(r0, &(0x7f00000002c0)="f91795cf5b6794d7634bf386f705c01ca6aae358a5898a755a3adefa19ce41340688d546cd3e25556dbf87fb54438555162fdfd27e45ab2c21b532b0ce963fcc83ed1e922b46a7f6f765aabca6f07ce0cabc6170851f94f798fc80a4e890df087a907f0b47d8df701bd259b231a785c3739ba75e82e13230fa2f5812f6376ebb6b4741af381f310e29d0d8a853ea52b3463437de5d60ec4f5a8f2308a1ecf51b0221511817db6bf3020c6f9f392d315319e2717bb3bbaa0319d0b4e18ace2f6b5be55023087614fa575756c1317d2fd56c5c3e9c49839cdec7631a6e13c620ab677b49ad71818961bf549c6aff36c301d9296ff21bc831428804fc3428d047", 0xff, 0x4000000, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000100000000280012000900010076647468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000003c0)={0x3, 0x0, 0x5, 0x29, 0x40}, 0xc) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x9, 0x10080) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x644c) [ 1173.520434] audit: type=1326 audit(1607768985.432:179393): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4033 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x1, @tick=0x1, 0x3, {0xff, 0x81}, 0x7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0xed, 0x6}}, 0x30) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5}]}, 0x2c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, r5, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x7ff, 0x3, 0x4]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4008) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r3}) sendmsg$NFT_MSG_GETFLOWTABLE(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004004) 10:29:46 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efe00301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1173.640105] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 93.0 filesystem [ 1173.662910] squashfs: SQUASHFS error: Please update your kernel [ 1173.763350] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 93.0 filesystem [ 1173.782353] squashfs: SQUASHFS error: Please update your kernel 10:29:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:46 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x7) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:46 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53eff70301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000000), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:46 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53effa0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) 10:29:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:46 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53effb0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1174.015435] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 159.0 filesystem [ 1174.034857] squashfs: SQUASHFS error: Please update your kernel 10:29:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0xa, &(0x7f0000000180)=[{0x81, 0x6, 0x1f, 0x1}, {0x6e2c, 0x3, 0x2, 0xb7f}, {0x20, 0x80, 0x7, 0x1}, {0x7, 0x3, 0x4, 0x5}, {0x81, 0x2, 0x1, 0x5b}, {0xc0ed, 0x19, 0x6, 0x800}, {0x1, 0x9, 0xad, 0x7}, {0xfffe, 0x19, 0x2, 0xa21}, {0x400, 0x80, 0x0, 0x7}, {0x9, 0x5c, 0x8, 0x9}]}) r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0004000000000000240012000900010076656b68e5b236e8412f9eaa91ab389f0311c938b4a7b84e64766eca7cb9f221f4fcb044beb328afb2cd116452a4304972c46664f28f4a478129f1c8f117ffa94198d9b4c652a6cddfd6836a7d7fe7de8e49123ef5c9d863491ec597bcee5af05b52b3ed64ea3def84ca78eedc46b0f75d628887201ebfc3b55ad501"], 0x48}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000340)=""/163, &(0x7f0000000440)=0xa3) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x9) 10:29:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1174.183540] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 159.0 filesystem [ 1174.200172] squashfs: SQUASHFS error: Please update your kernel 10:29:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000000), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:46 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53effc0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:46 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x188, r3, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x128, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60092f9a}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5678808a}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x34a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6e49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x506a4aed}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x260b5868}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xacae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x582}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x297c40d9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x37a33f45}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4aab}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc056}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x17c2faae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9774}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e97a288}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x360c8534}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x56a9}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4ffa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7c77}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77899a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd915}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x56ce9c5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x13c74243}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6346}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x322}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31e4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6376c5a3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb14b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb888}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f9f019b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x416c02bb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc70dcd5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x188}, 0x1, 0x0, 0x0, 0x8000}, 0x4000804) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r5, 0x7a6, &(0x7f0000000480)={0x6, 0x869, 0x7, 0x6, 0x3, 0x1f}) 10:29:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1174.376703] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 163.0 filesystem 10:29:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:46 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53effd0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x67) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x8000, 0x4) 10:29:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x8a53, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0xbea00, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x3}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xbda}}, 0x10) mknodat(r2, &(0x7f0000000000)='./file0\x00', 0x8000, 0x9) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1174.423983] squashfs: SQUASHFS error: Please update your kernel [ 1174.509656] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 163.0 filesystem 10:29:47 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000880)={0x204, r0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x80}, {0x6, 0x16, 0x4}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x7f}, {0x5}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x5}, {0x6, 0x16, 0x1}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x20}, {0x6, 0x16, 0x3f}, {0x5, 0x12, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x80000000}, {0x6, 0x16, 0xff00}, {0x5, 0x12, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x16, 0x4}, {0x5}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7f}, {0x6, 0x16, 0x200}, {0x5, 0x12, 0x1}}]}, 0x204}, 0x1, 0x0, 0x0, 0x80}, 0x4008000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) ptrace$getregs(0xc, r4, 0x7, &(0x7f0000000240)=""/96) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x101, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) socketpair(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r8, &(0x7f0000000140)={0x18, 0x0, {0x7, @dev, 'macvlan1\x00'}}, 0x1e) sendmmsg(r8, &(0x7f000000d180), 0x4000000000000eb, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) 10:29:47 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000001340)={0x5, 0x80, 0x7, 0x0, 0x1, [0x7, 0x9, 0x6, 0xbdf6], [0x400, 0x3, 0x8, 0x8], [0xfffffff9, 0x3, 0xe6f6], [0x20, 0x1, 0x1, 0x101]}) fsetxattr$security_evm(r0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000000280)=@v2={0x5, 0x1, 0x11, 0x2d, 0x1000, "c358bad9bb6e131095a952516607cc3aa9d192db64e92ad09d0e35d67075cb75964f01b0030409d8370da4677cb9530d955ec7fb02280fb5389e4e095549c21d1f72886158e0a5d0bd090b3c7dfe51a2a2500f1446bbf6c00bf151b1de296b1d94c39d754d0797460c73e6005c29ec0a3f29e921cd3e2607f1dcd2a9b435d5f67790f0be8f55ec7b59982d22fea592093d88d50c9ead3ce20cc755b8bca4b5f9a0f9d91ac56281b6e721e2d8aa735ef1d9176320c1b1504c7a2e8e6b7306c5f380617d3727bc687ae482db3d4e8f04995a3b8d9afac2539d64ed3f01c185454a89d8337ec30adf92889bb326491b56dc36f1cb36621071c838f3dfc18af22fe16d6dae6b2a0b09603250735778da8deb32c1bb0327cc1fc70923ba0109af89ce9d9ca2f837cdfb251e8ecf0c071582518c56d0992ed7fe3db612d1325a1bb17929c689628ec6ab1750d2d449292325e39fd527fd7d004707a63dd64b38f146e8c7f687be19b09581dbb2fa6f77ff284ed1913877eca05e1c350744b5867ee1fef615c06059201f0ac6f72f4835571a37109ff8b6acc704cb1853214bfcd14404892b0da556e20dafbcd98932427eec69000e4dcdda62eaa1ccf72982eb20608608beb53078aaa135eabec5d6d26b19dc39db12a79ad070682c117a3391c4b6cb59a82f494700c4012eb7292e6f2099f522b036dd38bc3754fc557c74e560aa27ddf97351960396ad47542f112e59ecd0ff55ad8d22ded2306e81bb79333261b9e995b22ed11ae48cfe0f5034c47ddcd6d39ded41aa26c3b73d25554a47f861085eef2869d6928b91a820aded6ea2fcbcb5b021681efef51d02f98ef8e06e1be93b5aaee26c9110dcb1f88f3d52042befba5ad2eca84481328f10886be54374be9dd2413b7bf5789629d96fc06fda8c775dbd11c28869d557a814008592f87539a9990051965198c2d424909e494e74e654983f54604ca218a10e8b685cae9c812c9e849ad472a8f715b2f885abd82b9fb0f1e0826e9fb19312bc67790ca762906d2999a1fd874cca00593379d924cdf3532eb4cdf683e2d0c88470e5d3241a39eefbcafc40ba731e75de2e27e84351833e41193402e75011dcd6c0a217f44c6c317d8cd54a8b58b6b349be090838ccbcf47730acf124b7497a3d1011b90ac866ae061bb04c8ab94b52f04c9e669ed497fa2a268b79475ac38587e237df9d836a2a641b4b73275f276d755006d36d5a4eaaf75dd6ae8c581aff6cf998ecdcd2c98c5d5209b9a369a0c15f1d8f80679500146e6b701379332fa8fa0cc9dc2053b53ee61fa0893481252a7d5d29a8b7db150fd0967e51de593effab6fc89090363bdddc565905f6ce7dca9c7e036784fc6d126515713a338edefe59687f048dd621b570523aa28ea9778a42059dd026de733065e046690152641e22a5304a1d28561e61d30ab003339faa52b6b263bf8d1b483cc8a55e2b5c3f169f60194748ca5a42f47192dea41d3bcfa2ad930e31d08547432527a5bbf385c72d7d50cdbf03256423c177acb625e601a36b7f3252ffea16e5e4546d83deb5a1cf6531ff10c5b1916d7cbd8e10f5a218b4991190cb6e83bfd7f13d294558cda829ee8339352743e35c262ff09319562950a0be15c8b2a667799ffd307c5ba6c617aa6488e270f4f03dd742029f0bdb4f56e87a6bd9dd09665f4e3e9e7f51831eb8763d98c4a1176fbeb3030f61ba0a378fe8c2ccbc80f195afc8ff9d86295d8e53076446db429a3f54a19166b3c9b8b86d19d859910433dec733dba378e5518b8ac797954560880c31b7769701c42789aec1ee7ebe037dee5eb53457521cd4ad35ba1360ff40bab9ccd79d17072271f20e250cf172e87b4c2276e031903730f7371bba3a71c13dafe1e522aef185f4defba756749bb2575419f1b7fb8e87ee6a72883fa44c8ceee5e1e2240fe0a25494cff64d75519304f2aba17ea4df22d279d957b005dd379f004cad3bc982fb0b176732f7bb05f11bbb13091753a7dd93933a6259c8dd2f61ad8229eb87e9c8ad9712b510035c7a6a1f16c8518a5d629062328dc718ef43076d81aac266fda6bff86ebe49abf2124c0ecd94628f677cba763127d49e9f860c4fe7b982a30626eabdabe388cbdcdb5709abc4b40b99e372b3c436f6f9ad464219fe67bd0f249d0fcfe9b4704f705a7059a3af0855f140c4d2f976517fb5fae05945b7ba2a25d0e7712c3921975d6c531fcf3d12d0a6e520ca5a8e2999c8939dec9e5d196edb08c172fdd4ece019e5f2a38f274e240056a317842cf1739df2d1b82724a1bb2e2d31412125ebfe3168d42aae8740506b20b8f3f5e93d9640abd6f8643d8022c11af174276c66e2d5627fe3257352f6bd07c33994b800b6bf2a563f7c8bb5ce798edf36ffba94acc8c7464791d7966f659e6a7cfd43b520c90e0bd79bd357617f007b45fc431e92867202df5fbfd407becb4fe8e6f2f87fd236f5a834fc84f6a8bda50b17ef3d9d5145ed85eee5e9fefeaded01670f6b6b3bd0cb95e0edc753177533c89b3fa2cfd6b6aca1683c063c61a7bcc845274d34f087ca2e0ca7bf6a0ffb7753bbbb430dffa78f902245544153835e3b789080fddaf8aca8c061a4c59a5e9d8de433e7bb9efb72651f7a0191542d944c3a94693241a2f2235b06bf50e828df51d872aab0771ae0306d5c7bf4d803db67fb3486eb3feb21a0024b9e4772dd12c71801dab07ebbf7f86f456f115af112298fe1a7d7a3131261c84722447cb2e6bee0ea2d9b69167e6f313486445568f951be3e5ee138b6ad2829b6e67711b9333a734ab906b4cd01b67919773784527a549dac48fbca26734f8d9b885703c9e2b71bdeaefd70eef209b14c502cd33b51e06d70b71bcdb2f26fafda6cd3c7ab44ffb77713c8e5a6efe25e327825b6a8d8655662579212de242e4c2aa304e321a02b878fd23f463c9697c26f3726e6ca72a87b905ae2940bf67749a4e85a673e40091e015c5cd93201576d756d3ea80c1261c4db2c9501e01570ccdc89262e64fc7d00aae3da8cb1fb96d3635bb090acfbd8c82af160aa587326e72786a1c4bf7408a11dcce357930af1de141c452d92a76d56429ba3441ca7965688b44a191b640ffd7bc2c1bd95b7a189166b239b1fc96aead25eca8e3acfa693d3efb57187a91a76aa3d90490ce15caf69065198caad2823b1e1f9b18ac666f3fa3c395176c6a1c1038e1e5e4a0a98c2df91455fc60377701b946e27c72e6f94671ac9bab372519a011d7fe314f984464649d172312841436c97dcd6f07d8ab5b694f82532edd4a874f5de0515be83ee213261cf3309871d7f0ea4763ce5cb944665dfe48cd58997b82eab288191e55c33a3e607553fa7198a6c982ca5c8e24534c884b3dcd5ada066aa024bae827dadd318ebcdeb2d42a44dded36257df083d92ce6bac0800b6940b38f1083ae8956b3c68d92423faed98211ba7dc033bcb5382d9b6a3ca208ca03efd399eb682c61057190977ad679ea367ad0363afb912a74966544b7a71a1dd9582d6e46f6a3c020fc8c7b84deea54ffc957d7c6bade3a84eb1782faa92c629fe6160b4a98336ab630c962a639f568368db323270abd2e0e5240ef74685e3629db7fd84a6375fa31bab6f31b4043190f9e35636913c223a2dbd5b8ba56b9c8cfc724baad8a6f7a42ded184aa0868b81f170c00578644b1e7779352bb2ea2565cc7c7f9269459717e473391b366c43fa4fd4fb5e1af140bfc8066a924c54f71f2c52513e1c872614bd5a7f2c8b412b10f8f9bde170ddcfa850d7fb0c6e16b4d1768d250ff9efa27774b8b5351fb07b46efedccfcfeb232395397d017652c19eef57df4d9de5ba840c0c082c2b62ce467cdd3ff19b4274ea39a7d486d742b684986423ab55e458c7602f9f701465339cbcff62d2e5795526489b08d872d558fc31be0ed10875d8bf7c494de0bd718e809c4a1a57c5c3fd9be60ad25b28f739dd2452998c8e91235e94c08bf2dc1b070b6c0674538534dca3393d01df6dbcf7adbce892c6217edec8c417f552639cd8f4d6ef624d6703e9af2e1663f8e1042488f0f0fcf0a0f10272bb0bdd8fc2e295a41fa3aa446c0d8dafe31ae2eec8d87074518cfb80f579f3886099a799bbb8e9764b6092942bca73ddda8b580b11a60e9a006d6fed29ff3cbf0dab2a72f16f53433e01a0461f4c483e9dc549d410ba94834749a154d8de30e66dc3a9f26570c46a35b8daa99a1c0a0dd0944745e9864cd4b12cf1fae9c31d422bc854b339bb6cfb6285aa5929567821f446da6ff01fce74404c0fe6717ed018ecd62d5b0811aeeb1dec3bcf14c52b00dd17b38a92c63b92607fd405cfe235031d86925d31a2e160580498c4882fcb97e4fa1533a9e638e0539974bb4a39050dafb5b886ae5801e77714b069710fb963b3ebaae00b8fff68daeceabce59a7eafdfe7891a22d66c5b06a42413fb6e1f10c50beb41e81128cf7f8f7bf4b7d207bf6a9a1e0e2f0bf1801286e05494c7ad9654465261e07571b94d702b301e9b34c6acac1ff2038a5e1db11c6dc7637eb12426910dd59193c5b00af5fad6da78bdb685c166fd3ae4ea3980870f9303ecea3d76d47cceb7a4f2b72f6adcbc720c8d55e37887100a0c474c545cfb18f8b6bda25f9b892b9494f8846434d699e8137def7d8f9a3c6b07c43d632d0bdfc194a2655259e7a3adc9b09e32fd39c9a4cf49270ce543eeed611cb86fa0617f4834dc6eaae20d799fe83779d47bbffeb8d0f72bb7847a29a8dd72e5efc66c6a34af5f5d98b88e2b6c075443a575e5c8df49bf25acf1dc68519a109bb2f544b070e33654aab242a2016cb380ada030b2b51ecca3e140fec76cff1c84d5f3e30139848530ec6c698bbb16b9ae68b54d11d3739071ae49a8b5feb96a4898afcd8244084a52dd1094f10628035f1eae0d1eb875e16c2ff420c0c83747d553a53a66d4581890d168a02fd5ab693bc67c18051cf7654ad72e6e3877a11b3e27c1fef876e5da57e14b73a8c608a647b9c43a25183565cb5d7a0e7a9af7d82686048af5e620520bb4b753baf6ff9b0b871471d4ae028b1038fc4c4d247233e6471d96c3e5bedd19cb543b3d652a35ddd5619b4b426586f8270fa537250ce39a0f8ec4d9452102eb6291e46a396751c321ffacede904b84c23c603964d0af2622fd1450a8dfa5a9c4d607c6f2e9d3c810b96fb04a2a5e643db3d0f7454e2dd0b954674c8d270b6a1adf68498ad95ef702e4aaf3d3a3e9234f6a4f317d3ccfe20b3291ece118cd7446d4939a435fe224535735ca32cb2a82a4a563ac7d7727319f332c2088cd796b6681b4618e1f0f6c754dfa9f248ec17733aef66df3bc73b7bc2a6d0acccca9dc99129805eade95a68ae52f21d93bbac86f3f13d773324165764278b9d93c9598c6c5b5fa00e50a7e31c80eb556ea3e6d7dd1bb48eafe1391b9286b785c1884001e4a5bb03e22739635123ca18d06314c08252643539ac769a2ad08a9401f007e693a03b49dc1d8147dee618bcecc310706b0cde4f61fda4c4e03dcf7e828b6a1aa61b79b16ffda9355f59aaf9d9d7215781814f59d03b459c216d1633498f149135d8a6af6c8c6cb17745352d99c99c7e2618102d76208bcf368aa4d3dc899c2aed84d05f2f3800a3a6a8f1ee17d0b2844639a18b4e4689e53a7a33dd96530742dc8d083c248b0320ba33e57717497b780766d2a3080e75ccbb47d0d376de2d03efa46b11e5e575a4210fc8a4105d4c3c0339df8f081831f3087be53625de1"}, 0x1009, 0x2) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={0x3, 0x0, 0x3820, 0x800000000000008, 0x6, 0x8}) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80401, 0x8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000012c0), &(0x7f0000001300)=0x14) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1174.559696] squashfs: SQUASHFS error: Please update your kernel 10:29:47 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53effe0301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:47 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:47 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef060401000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:47 executing program 3: r0 = socket$inet6(0xa, 0xa, 0x7fff) sendto$inet6(r0, &(0x7f0000000240)="109535192793d342cb4c3408c3aa8aa10431c0cf1e9a7dfd6d432649045f6de50100"/43, 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x14, 0x4) [ 1174.872147] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 768.0 filesystem [ 1174.904598] squashfs: SQUASHFS error: Please update your kernel 10:29:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:47 executing program 3: accept4$x25(0xffffffffffffffff, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000180)=0x12, 0x0) r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:47 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef0b0401000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:47 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:47 executing program 0: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)={0xfd, 0x5, "7a4b3d7479df170027d0d25ba99b318eb1c4fea0d38ea96628f6dc8f0b86a7d5fceaf2ccca3b9725fd042aaf48579303df5121170592ce10d9345d6f02f720e76b9d99d0fde3b666661c61bfe30f1a18c0a989cdfb31473fe0b7918cd6e083192a163ba893191b92e4eed08866a19043daac60139b6183f39a0493be50931d0493d7fd02b10598db127c9da503729bc379ba5c340787a137978f8dde654252794363ef35b77de8a0870b21cac8f0961e4a1ef5c271a033da4847fc03fd1b9f03925560014ec55132d54b6dc7f69e17579ab087f2722fb1f83496b242be57747fe88aef494d94cfa77f8fefff6e63ccd570a4614ab7"}, &(0x7f0000000740), 0x1200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x440001, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000540)=""/218) r3 = syz_open_dev$dri(&(0x7f0000000780)='/dev/dri/card#\x00', 0x4, 0x80020) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f00000007c0)={0x7fffffff, 0x76}) r4 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000000), 0x30, &(0x7f0000ffd000/0x3000)=nil, 0x1) r5 = dup3(r0, 0xffffffffffffffff, 0x80000) sendmsg$nl_route(r5, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@getlink={0x358, 0x12, 0x100, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x100, 0x100}, [@IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7dc1}, @IFLA_EVENT={0x8, 0x2c, 0x4}, @IFLA_VFINFO_LIST={0x218, 0x16, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x7, 0x1, 0x7fff}}, @IFLA_VF_VLAN_LIST={0x2c, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1ff, 0x21c, 0x7, 0x88a8}}, {0x14, 0x1, {0x0, 0xa44, 0x100, 0x8100}}]}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x2f0, 0x5, 0x1}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x835, 0x30d}}, @IFLA_VF_MAC={0x28, 0x1, {0x6, @multicast}}, @IFLA_VF_TRUST={0xc}]}, {0x58, 0x1, 0x0, 0x1, [@IFLA_VF_LINK_STATE={0xc, 0x5, {0x701, 0x10000}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0xfffffffffffffff8}}, @IFLA_VF_MAC={0x28, 0x1, {0x3, @dev={[], 0x38}}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x8, 0x9}}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6, 0x10001}}, @IFLA_VF_VLAN={0x10, 0x2, {0x3, 0x96b, 0x1ff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x1, 0x6}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x5, 0x7}}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x10000, 0x7fff}}, @IFLA_VF_RATE={0x10, 0x6, {0x81, 0x1, 0x389}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x7, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x20, 0x2, 0x100}}]}, {0x9c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x4}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x3, 0x1}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x0, 0x2}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8, 0x2}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xffffffff, 0x5}}, @IFLA_VF_RATE={0x10, 0x6, {0x5, 0x7f, 0x4e}}, @IFLA_VF_VLAN={0x10, 0x2, {0xffffffff, 0xe83}}, @IFLA_VF_RATE={0x10, 0x6, {0x5, 0x8, 0x4}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}]}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x6}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0xc41e}, @IFLA_PROP_LIST={0x90, 0x34, 0x0, 0x1, [{0x14, 0x35, 'veth1_macvtap\x00'}, {0x14, 0x35, 'veth0_to_team\x00'}, {0x14, 0x35, 'sit0\x00'}, {0x14, 0x35, 'veth0_virt_wifi\x00'}, {0x14, 0x35, 'geneve1\x00'}, {0x14, 0x35, 'veth0_virt_wifi\x00'}, {0x14, 0x35, 'macvlan1\x00'}]}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x7999}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xc848}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xd040}, @IFLA_VF_PORTS={0x58, 0x18, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "848921accc301d686b66d160589d7b0e"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "037d70cac516b34db3731e38e4d4d44d"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9cf98842c94ed6abad8303dd910cffbd"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d95d73d304df08b3f9cd4ea48ce1d16d"}]}]}]}, 0x358}, 0x1, 0x0, 0x0, 0x8001}, 0x8040) [ 1174.977896] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 768.0 filesystem [ 1174.992253] squashfs: SQUASHFS error: Please update your kernel 10:29:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:47 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:47 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef000501000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) close(r0) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:47 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:47 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200), 0x30040000) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$setregs(0xd, r1, 0x4, &(0x7f0000000180)="8ec6b840260bd0ae33fbc772dd35c54387a2ba27e734c5ada5d9bb8eb8ff319bfb4f3268114e654871c4ae873f9837a1d174263195fb573663e46f3e7a3c32e2bd8b3387d5768fbf20af5e0ec2780d1694ebaf185b5e5a08620f9d3155cc60b763e89eef1853dfe2b73d2d864bccb8e3de0e4840b59c") 10:29:47 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efa62601000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1175.336393] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 1280.0 filesystem [ 1175.347269] squashfs: SQUASHFS error: Please update your kernel 10:29:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_mreq(r1, 0x29, 0x8, &(0x7f0000000140)={@dev, 0x0}, &(0x7f00000001c0)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x39, 0x2, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ldst={0x3, 0x1, 0x1, 0x8, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f0000000040)='GPL\x00', 0x0, 0xa3, &(0x7f0000000080)=""/163, 0x41100, 0x11, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xd, 0x1ff, 0x1}, 0x10}, 0x78) r3 = open(&(0x7f0000000340)='./file0\x00', 0x42ae83, 0x183) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CHAR_RAW_GETSIZE64(r5, 0x80081272, &(0x7f0000000300)) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) 10:29:47 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:47 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efcc2601000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:47 executing program 3: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000180)=0x30) r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) [ 1175.443212] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 1280.0 filesystem [ 1175.473214] squashfs: SQUASHFS error: Please update your kernel 10:29:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53efeb2601000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) r2 = dup2(r0, r0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x2}) 10:29:48 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) r3 = open(&(0x7f0000000180)='./file0\x00', 0x200400, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup(r4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r3}, 0x8) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0xa74) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000000)={0x0, 0x101, [0x10, 0x7fff, 0x3, 0x6, 0x4], 0x6}) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000004320602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53eff42601000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef002f01000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:48 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0x2b, 0x4008090, &(0x7f00000000c0)={0xa, 0x4e20, 0x10000, @remote, 0x1}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$notify(r3, 0x402, 0x80000000) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000180)={'dummy0\x00', {0x2, 0x0, @dev}}) 10:29:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, &(0x7f0000000840), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x4) ptrace$getenv(0x4201, 0xffffffffffffffff, 0xfffffffffffffff9, &(0x7f0000000000)) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef003001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1175.820090] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16384.0 filesystem [ 1175.837529] squashfs: SQUASHFS error: Please update your kernel [ 1175.947162] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16384.0 filesystem [ 1175.970255] squashfs: SQUASHFS error: Please update your kernel 10:29:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x70, 0x1, 0xa, 0x201, 0x0, 0x0, {0x9}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x20008000}, 0x10) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef003101000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000004340602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYRESDEC=r0], 0x8c}, 0x1, 0x0, 0x0, 0x1}, 0x80) 10:29:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1176.156902] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16385.0 filesystem 10:29:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef003201000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000700000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="833b60ef1ed790a22de581c575de821073f6ce5ebd6751c5344bcb0d8612fd4f40015e626b9535598c2137f8d52ef32afe59dffae6e28b8f049f0344bb4b361ac699f2350d035bf4c5cb09f8d3d5885de4bef5e913393fd7c3e0961ad702f8a9b1431a6c4964b5241daf8741a2546de32a2e3285231918c5810786eea5c791", 0x7f}], 0x1}, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) [ 1176.221199] squashfs: SQUASHFS error: Please update your kernel 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef003301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1176.306376] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16385.0 filesystem [ 1176.346465] squashfs: SQUASHFS error: Please update your kernel 10:29:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000240000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x2, 0x4e23, @rand_addr=0x64010102}, {0x2, 0x4e20, @remote}, 0x200, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000180)='wg2\x00', 0xffffffff80000001, 0xa34, 0x1ff}) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000000)=0x80000000, 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000200)=0x78, 0x4) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) accept$inet6(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f00000002c0)={0x2}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r1, &(0x7f00000012c0)="11268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9281a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 10:29:48 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef00a201000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010200000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:49 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000004370602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1176.680217] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16386.0 filesystem [ 1176.830476] squashfs: SQUASHFS error: Please update your kernel [ 1176.926427] squashfs: SQUASHFS error: unable to read id index table 10:29:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, 0x0, 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x2, 0x4e23, @rand_addr=0x64010102}, {0x2, 0x4e20, @remote}, 0x200, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000180)='wg2\x00', 0xffffffff80000001, 0xa34, 0x1ff}) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000000)=0x80000000, 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000200)=0x78, 0x4) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) accept$inet6(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f00000002c0)={0x2}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r1, &(0x7f00000012c0)="11268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9281a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010300000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:49 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010400000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1177.056478] squashfs: SQUASHFS error: Major/Minor mismatch, trying to mount newer 16386.0 filesystem [ 1177.084687] squashfs: SQUASHFS error: Please update your kernel 10:29:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010500000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x2, 0x4e23, @rand_addr=0x64010102}, {0x2, 0x4e20, @remote}, 0x200, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000180)='wg2\x00', 0xffffffff80000001, 0xa34, 0x1ff}) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000000)=0x80000000, 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000200)=0x78, 0x4) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) accept$inet6(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f00000002c0)={0x2}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r1, &(0x7f00000012c0)="11268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9281a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 10:29:49 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef012f00000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1177.306999] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -16384.0 filesystems are unsupported 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef013000000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:49 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef013100000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1177.511667] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -16384.0 filesystems are unsupported 10:29:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, 0x0, 0x0, 0x7ff, &(0x7f00000017c0)) 10:29:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000000)={0x1, 0x7fff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) readv(r3, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/150, 0x96}], 0x1) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef013200000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d000020001c0000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd0100000000000001", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef013300000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef01a200000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1177.717717] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -16383.0 filesystems are unsupported [ 1177.791412] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs -16383.0 filesystems are unsupported 10:29:50 executing program 3: io_setup(0x81, &(0x7f0000000000)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) io_submit(r0, 0x2, &(0x7f0000000140)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffef8}]) 10:29:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010201000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, 0x0, 0x0, 0x7ff, &(0x7f00000017c0)) [ 1178.061883] kauditd_printk_skb: 972 callbacks suppressed [ 1178.061896] audit: type=1326 audit(1607768990.512:180366): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 10:29:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1178.125493] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs 0.16 filesystems are unsupported 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010301000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1178.175490] audit: type=1326 audit(1607768990.542:180367): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1178.199332] audit: type=1326 audit(1607768990.542:180368): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1178.233188] audit: type=1326 audit(1607768990.542:180369): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45e159 code=0x7ffc0000 [ 1178.269080] audit: type=1326 audit(1607768990.552:180370): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1178.297588] audit: type=1326 audit(1607768990.552:180371): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:50 executing program 0: ioctl$SNDCTL_SEQ_TESTMIDI(0xffffffffffffffff, 0x40045108, &(0x7f0000000040)=0x890) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002100)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={r0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff031d600d698cb89e14f008001fffffff07004000632f77fbac14140ee934a0a662089f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x102, 0x60000000, 0x0, 0xfffffffffffffe48, &(0x7f0000000000), &(0x7f00000000c0)="61ae793cb58796e98bec67538e015077de7e272f4c58590e0a49abbb02864ce87f29c55242edc400de0f90b385e2f9c937fd3b232ab7c99460628f97e6d6f935e88684d642fd966756e2d8b5af7a9002d71c203c4dd9b55ae6eb91e77d823ca1a2de2496a532933552dfb5907808176243ef5971c1a9c84ebfbd113d1a233ed5490f124afc9b88bc97d734a20b1e"}, 0x28) 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010401000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:50 executing program 3: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000000)={0x0, {0xf2, 0x4}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x8000, 0x20, 0x6, 0xffffffff, {{0x12, 0x4, 0x2, 0x0, 0x48, 0x64, 0x0, 0x81, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@noop, @noop, @generic={0x7, 0x7, "fc39fd9088"}, @ssrr={0x89, 0x17, 0x37, [@multicast1, @remote, @private=0xa010100, @local, @empty]}, @generic={0x8dd0a3ac322d7eab, 0x11, "e3fdce79d0ad9057fa215a3b036fe3"}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', r0, 0x29, 0x6, 0x7, 0x1f, 0x30, @remote, @local, 0x8000, 0x20, 0xff, 0xf1}}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x74, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={[], [], @multicast1}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r0}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000010) r2 = dup(0xffffffffffffffff) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x1) sendmsg$nl_generic(r2, &(0x7f00000007c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000440)={0x314, 0x18, 0x1, 0x70bd2a, 0x25dfdbfb, {0xf}, [@typed={0x8, 0x61, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x4, 0x57}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="b7048c78b3f8f2825d7a0b79a66bafb770e65b2d808037014e1d9b42c006b9d2edda8c8633ff7b28626d67f4758345d31973680d4d04d8f6891af3f80259a8db7781938f24fbf8923053432e5595c0cb74e706171b07a6", @generic="a52521f71007e49bc12419e21f3c7377c5f0e70d901b9413bcf89972", @generic="a922d20f123f0d39", @nested={0x26d, 0x1, 0x0, 0x1, [@generic="f55b93d66c42e840deeeb8e2bd31c529dcf1502b58c742c700c149281c948ed3310d90f3bced1e2795246005ba23d19d8e07ecac297ea8744928efdff4ec0080adf93318afe1d2ffeecb1ad12d0931610da0ddb6e1ffed956ce077731bc492a350a900482c11516f70e8952fe8bf1e9ac39e23a7fa520886219da74fef80146e68607e7fbaeef9953c0b9683090023757b05f589e8e5092503d46da54afec22c69502148402eef5d1b3f5d5549908930b2b5fb181660e5e2565a23b3ef40b1733191d08d7a13be4a1b62d73ce84a4e9d456151350f6f50501e147a", @generic="6db5cd5d8b88e7522168c27508f6a1164d37fa20380fa6e19b6fb336092b59b5231e1a4551b7b8488e6a94f9bea2e46b4f6fe0aebc6a8c688425f61c99907a5f0cbead68e8354d4cf3a35cd1b5a2a45787e84ff69338c6633dea6ac4dea560e16b68946c139a242cd97552add9214eb7ea524b872c77706655b0c7b3701dfa97623b588324c109edcb90f6d993e230974a4981f3e50a69852da622e64bbedf2a112217", @typed={0xc, 0x14, 0x0, 0x0, @u64=0x2}, @generic="21bad258d1582931fa93eabc2568a8de69ecf13935324c38ef4ca7a3d44898670bcc058ab0f11f88480322e89ee6938334c046a0d7d4ae015689092b361e4840720540a8956d51e354fa060d2bbd7eb690a7529f3bb0bd12e25d3fa3a8ea12bbe7ce49ca30ddfd6c245b21506d88455dabba92f9ce2a012db35efe959bd8e0dbb441219ae73cecf7792c1be3c7b4d486940f896813c2beb1716f14a3492a0d4f2f6b2f16d496a689b2e8a37d62b28bd1388050f314e7b0b4732178a17aef82df50bdd96a9a3ee61a5192e0adde5d99ba59a6339f7f952e4fbfc03e2da9ae7c"]}]}, 0x314}, 0x1, 0x0, 0x0, 0x4880}, 0x20000000) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000840)={0x118, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@private=0xa010100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x868b}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x58}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7821ede2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x85}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r4 = syz_open_dev$mouse(&(0x7f0000000b40)='/dev/input/mouse#\x00', 0x9, 0x1) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000bc0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x34, r5, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x1000}, 0x54) ioctl$SNDCTL_FM_4OP_ENABLE(r4, 0x4004510f, &(0x7f0000000cc0)=0x815) r6 = creat(&(0x7f0000000d00)='./file0\x00', 0x1a8) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x28, r7, 0x400, 0x70bd26, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24048000}, 0x4040044) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000e80)={0x6000, 0x5000, 0x0, 0x8, 0xfffffffe}) connect$rxrpc(r6, &(0x7f0000000ec0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x2, @mcast2, 0x8}}, 0x24) sendmsg$NL80211_CMD_JOIN_OCB(r4, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x2c, 0x0, 0x120, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x80000000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4081}, 0x4000004) 10:29:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)) [ 1178.335137] audit: type=1326 audit(1607768990.552:180372): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7ffc0000 [ 1178.358201] audit: type=1326 audit(1607768990.552:180373): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x45e159 code=0x7ffc0000 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010501000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1178.472862] audit: type=1326 audit(1607768990.552:180374): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x45e127 code=0x7ffc0000 10:29:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(r1, r1, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000340)=""/110) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x2a8, 0x180, 0x0, 0x148, 0x180, 0x148, 0x210, 0x240, 0x240, 0x210, 0x240, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00', {}, {}, 0x11}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0x80, 0x7, 0x0, 0x18}}}, @common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e24]}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 10:29:50 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010601000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 1178.547997] audit: type=1326 audit(1607768990.552:180375): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=4616 comm=D467713FACE8D95DC578FD1F1D7385 exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x417cb7 code=0x7ffc0000 [ 1178.636619] xt_CT: No such timeout policy "syz0" [ 1178.644229] squashfs: SQUASHFS error: Major/Minor mismatch, older Squashfs 0.16 filesystems are unsupported 10:29:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:51 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010701000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 10:29:51 executing program 3: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) symlink(&(0x7f0000000380)='./file1\x00', &(0x7f0000000500)='./bus/file0\x00') mount(0x0, &(0x7f0000000f40)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x10010, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000fc0)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @private, @multicast1}}}, @ip_tos_int={{0x10}}], 0x28}, 0x4) close(0xffffffffffffffff) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f0000001080)={{r0}, "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"}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b00000000000000006c65312c6c6f7765016469723d2e2f66696c6530"]) chdir(&(0x7f00000001c0)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) 10:29:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2=0xe000000f, 0x4e24, 0x88000000, 'sh\x00', 0x0, 0x0, 0x1}, 0x2c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) keyctl$update(0x2, 0x0, &(0x7f0000000340)="101711025b65abab1cee58d2d36b11ea9cd23688986bc2c51a90e17878804c59c4f3a927898ed6029380a5ca2d53ec94cb4354f46d9cb617c9c1111644dfb2ddae0df068887f1bd880419054b7f2768f9dc203ea41fd705c89e16dc91669820f8cf4016bfab0e76ca763a426440d089aa62f494bef2eb1ef2acfa3f1f8ef3be41d3a396b8bea9bef4e08aa8afb6c0bdc4834327b0e3d92801e4491bbd88abd0816dc2b78e5e1ad79bbfa710746933d19bad0d5956b64b8f628e2482c1935118ad36d5907f034dd89f4d46a39de09e2e58c85240da2c50a2a3845521a5443e7da9e5e8de218abec91deecbbaa7565cb48bd16207f88f0a877cca7980a", 0xfc) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="666c63ee559b9d3f40c36c00629f2e3b00e887808b9165a400aca4960f4fad5e1963ea868763787636722f7dc4c039394823ca2ccbecce1ef5f9766d9c87b311384d77e5", 0x44, 0x5}, {0x0, 0x0, 0x10001}, {0x0, 0x0, 0x5}], 0x1000000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000001c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @dev, 0x6}, 0x1c) splice(r3, 0x0, r4, 0x0, 0x100000002, 0x400000000000000) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000040)={0x2, [0x0, 0x0]}) [ 1178.890434] ================================================================== [ 1178.898163] BUG: KASAN: slab-out-of-bounds in squashfs_get_id+0x1ae/0x1d0 [ 1178.905103] Read of size 8 at addr ffff888059977838 by task syz-executor.4/4684 [ 1178.912547] [ 1178.914188] CPU: 1 PID: 4684 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 1178.921984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.931340] Call Trace: [ 1178.933934] dump_stack+0x1fc/0x2fe [ 1178.937583] print_address_description.cold+0x54/0x219 [ 1178.942875] kasan_report_error.cold+0x8a/0x1c7 [ 1178.947556] ? squashfs_get_id+0x1ae/0x1d0 [ 1178.951799] __asan_report_load8_noabort+0x88/0x90 [ 1178.956766] ? squashfs_get_id+0x1ae/0x1d0 [ 1178.961006] squashfs_get_id+0x1ae/0x1d0 [ 1178.965075] ? squashfs_read_fragment_index_table+0xf0/0xf0 [ 1178.970819] squashfs_read_inode+0x1ee/0x1b40 [ 1178.975329] ? lock_downgrade+0x720/0x720 [ 1178.979485] ? squashfs_read_id_index_table+0x120/0x120 [ 1178.984856] ? map_id_range_down+0x1c4/0x340 [ 1178.989288] ? new_inode+0xc7/0xf0 [ 1178.992851] ? do_raw_spin_lock+0xcb/0x220 [ 1178.997113] ? do_raw_spin_unlock+0x171/0x230 [ 1179.001619] squashfs_fill_super+0x1655/0x1c00 [ 1179.006217] mount_bdev+0x2fc/0x3b0 [ 1179.009849] ? squashfs_alloc_inode+0x40/0x40 [ 1179.014350] mount_fs+0xa3/0x30c [ 1179.017735] vfs_kern_mount.part.0+0x68/0x470 [ 1179.022237] do_mount+0x113c/0x2f10 [ 1179.025881] ? lock_acquire+0x170/0x3c0 [ 1179.029875] ? check_preemption_disabled+0x41/0x280 [ 1179.034898] ? copy_mount_string+0x40/0x40 [ 1179.039141] ? copy_mount_options+0x59/0x380 [ 1179.043045] overlayfs: unrecognized mount option "work" or missing value [ 1179.043555] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1179.043574] ? kmem_cache_alloc_trace+0x323/0x380 [ 1179.043594] ? copy_mount_options+0x26f/0x380 [ 1179.043611] ksys_mount+0xcf/0x130 [ 1179.043635] __x64_sys_mount+0xba/0x150 [ 1179.072367] do_syscall_64+0xf9/0x620 [ 1179.076184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1179.077342] overlayfs: unrecognized mount option "work" or missing value [ 1179.081373] RIP: 0033:0x460baa 10:29:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x3, 0x4, 0x2}) ioctl$VIDIOC_QBUF(r1, 0xc058565d, &(0x7f0000000140)={0x0, 0x5, 0x10, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes=&(0x7f0000000100)={0x0, 0x0, @mem_offset, 0x0, [0x0, 0x7]}, 0x10fefd}) r2 = dup2(r0, r1) r3 = socket(0xa, 0x1, 0x0) close(r3) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="300000000000000084000000010000000000000004"], 0x30}], 0x1, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e20, 0x2, @remote, 0xffffffff}}}, 0x84) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) [ 1179.081388] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1179.081396] RSP: 002b:00007fa9be272a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1179.081409] RAX: ffffffffffffffda RBX: 00007fa9be272b10 RCX: 0000000000460baa [ 1179.081422] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa9be272ad0 [ 1179.132724] RBP: 00007fa9be272ad0 R08: 00007fa9be272b10 R09: 0000000020000000 10:29:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0x0) [ 1179.140005] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1179.147288] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020010200 [ 1179.154834] [ 1179.156462] Allocated by task 27116: [ 1179.160181] __kmalloc_track_caller+0x155/0x3c0 [ 1179.164853] kstrdup+0x36/0x70 [ 1179.168050] kstrdup_const+0x53/0x80 [ 1179.171767] __kernfs_new_node+0x9b/0x680 [ 1179.175921] kernfs_create_dir_ns+0x9e/0x230 [ 1179.180336] sysfs_create_dir_ns+0x127/0x280 [ 1179.184746] kobject_add_internal+0x2a5/0x9c0 [ 1179.189252] kobject_init_and_add+0x101/0x160 [ 1179.193805] netdev_queue_update_kobjects+0x128/0x3c0 [ 1179.199001] netdev_register_kobject+0x35e/0x430 [ 1179.203763] register_netdevice+0xb46/0x10f0 [ 1179.208233] veth_newlink+0x3eb/0x930 [ 1179.212045] rtnl_newlink+0x1027/0x15b0 [ 1179.216029] rtnetlink_rcv_msg+0x453/0xb80 [ 1179.220279] netlink_rcv_skb+0x160/0x440 [ 1179.224958] netlink_unicast+0x4d5/0x690 [ 1179.229026] netlink_sendmsg+0x6bb/0xc40 [ 1179.233103] sock_sendmsg+0xc3/0x120 [ 1179.236823] ___sys_sendmsg+0x7bb/0x8e0 10:29:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(0xffffffffffffff9c, &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0x0) [ 1179.240801] __x64_sys_sendmsg+0x132/0x220 [ 1179.245039] do_syscall_64+0xf9/0x620 [ 1179.248843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1179.254026] [ 1179.255650] Freed by task 26343: [ 1179.259049] kfree+0xcc/0x210 [ 1179.262161] bpf_migrate_filter+0x307/0x380 [ 1179.266488] bpf_prepare_filter+0x183/0x370 [ 1179.270816] bpf_prog_create_from_user+0x1e4/0x2e0 [ 1179.275752] do_seccomp+0x386/0x1c40 [ 1179.279472] prctl_set_seccomp+0x4a/0x70 [ 1179.283539] __se_sys_prctl+0x2d8/0xd80 [ 1179.287521] do_syscall_64+0xf9/0x620 [ 1179.291334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1179.296521] [ 1179.298155] The buggy address belongs to the object at ffff888059977800 [ 1179.298155] which belongs to the cache kmalloc-32 of size 32 [ 1179.310652] The buggy address is located 24 bytes to the right of [ 1179.310652] 32-byte region [ffff888059977800, ffff888059977820) [ 1179.322875] The buggy address belongs to the page: [ 1179.327816] page:ffffea0001665dc0 count:1 mapcount:0 mapping:ffff88813bff01c0 index:0xffff888059977fc1 [ 1179.337364] flags: 0xfff00000000100(slab) [ 1179.341524] raw: 00fff00000000100 ffffea0002ac8a88 ffffea0001616488 ffff88813bff01c0 [ 1179.349416] raw: ffff888059977fc1 ffff888059977000 000000010000003f 0000000000000000 [ 1179.357295] page dumped because: kasan: bad access detected [ 1179.363089] [ 1179.364714] Memory state around the buggy address: [ 1179.369647] ffff888059977700: fb fb fb fb fc fc fc fc 00 fc fc fc fc fc fc fc [ 1179.377009] ffff888059977780: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 1179.384369] >ffff888059977800: 05 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc 10:29:51 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010801000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 10:29:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000400)='\xd4gq?\xac\xe8\xd9]\xc5x\xfd\x1f\x1ds\x85\xf8{E\xb4\xb0h\xaf^\xa2\xf6\x0e?G\xae\x9f0\xeb\x00\x01\xffyI\xa6b\xd5\x10\x99\xbc\xc2[\xd5}\xc4\xd3\xe90\xadko\xe0\x85\xde\xb3\xf6\xa2\xacn\xa3\x8e\xc8J\x98\x84Yw\xce\xd1\x02\x8ae\xc3L\xb2\x12h\xa4\xfc\x85\xc18Wr\xdd\xb1\x88\xfb\xf3\x8euQ\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xff\xff\xff\x00Q:\x8d\xcf*\xe2\xdd\xd2o\xa8`\xb6\xa6Y\xfa\x94pl\x91\xa9\xc3\x8cj\xfeq\x9eF\x83\xa4<>\x1a&\x9c\xe1\xecf\xcc\x99\"\x0fz`\xad\xf9\xc4\xc6\xae\xda\xf2\xc1Oe;\xd0\x8e\xc8\x0fh\x80\x8e\xdbr\x1f\xc3\xef\v\x96Lp\xf3\x86\xc3\x98\x1a]\"\x17B\"\x9b\xff\x97o\xc1#P\x19#6\xf4\x9f\x06^\xc3\x8buX\x06\xc2\xed\x9dC\xee\x17*\xeb\xb4\xadX\xdfK\xe9\rU\x8b3_\x17B\xf5\xbb\xd3C\xb2\x1b\xa5p\x1a\xbf\xbcq\x82\x80\x8c\xaep4\x9f\xf4\xb5\xe8\xbc\xa3\xd1\xe8S\f>\xaf\xc2l\xad\xa3lK\xab\x83\xfe\xa4}0\xdf\x8b\xf7\xbf\x91\xe6.\x17^\x1b%F\xf7>\x1f\x1f\xad\xe4\xbf\xe2f\xac\x02\xa7lN\b\x90\xb4\xd5\xd6\xfb\xb8:\xd3]\'\xe7zV\xcc\xbb.\xb6\xc0\xf9\xb2\x97\xd1)\x02%m\"\x9d\xc7\xf0\xff[\xf05\xf9\xb9\xdc\x1a@\xbb\x1d\xc9') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) [ 1179.391726] ^ [ 1179.396917] ffff888059977880: fb fb fb fb fc fc fc fc 07 fc fc fc fc fc fc fc [ 1179.404279] ffff888059977900: 07 fc fc fc fc fc fc fc 00 00 fc fc fc fc fc fc [ 1179.411637] ================================================================== [ 1179.418996] Disabling lock debugging due to kernel taint [ 1179.464883] Kernel panic - not syncing: panic_on_warn set ... [ 1179.464883] [ 1179.472287] CPU: 1 PID: 4684 Comm: syz-executor.4 Tainted: G B 4.19.163-syzkaller #0 [ 1179.481470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.490825] Call Trace: [ 1179.493418] dump_stack+0x1fc/0x2fe [ 1179.497100] panic+0x26a/0x50e [ 1179.500296] ? __warn_printk+0xf3/0xf3 [ 1179.504191] ? preempt_schedule_common+0x45/0xc0 [ 1179.508952] ? ___preempt_schedule+0x16/0x18 [ 1179.513368] ? trace_hardirqs_on+0x55/0x210 [ 1179.517697] kasan_end_report+0x43/0x49 [ 1179.521675] kasan_report_error.cold+0xa7/0x1c7 [ 1179.526353] ? squashfs_get_id+0x1ae/0x1d0 [ 1179.530593] __asan_report_load8_noabort+0x88/0x90 [ 1179.535526] ? squashfs_get_id+0x1ae/0x1d0 [ 1179.540460] squashfs_get_id+0x1ae/0x1d0 [ 1179.544524] ? squashfs_read_fragment_index_table+0xf0/0xf0 [ 1179.550246] squashfs_read_inode+0x1ee/0x1b40 [ 1179.554746] ? lock_downgrade+0x720/0x720 [ 1179.558901] ? squashfs_read_id_index_table+0x120/0x120 [ 1179.564268] ? map_id_range_down+0x1c4/0x340 [ 1179.568678] ? new_inode+0xc7/0xf0 [ 1179.572223] ? do_raw_spin_lock+0xcb/0x220 [ 1179.576466] ? do_raw_spin_unlock+0x171/0x230 [ 1179.580972] squashfs_fill_super+0x1655/0x1c00 [ 1179.585574] mount_bdev+0x2fc/0x3b0 [ 1179.589208] ? squashfs_alloc_inode+0x40/0x40 [ 1179.593707] mount_fs+0xa3/0x30c [ 1179.597081] vfs_kern_mount.part.0+0x68/0x470 [ 1179.601581] do_mount+0x113c/0x2f10 [ 1179.605211] ? lock_acquire+0x170/0x3c0 [ 1179.609187] ? check_preemption_disabled+0x41/0x280 [ 1179.614204] ? copy_mount_string+0x40/0x40 [ 1179.618438] ? copy_mount_options+0x59/0x380 [ 1179.622846] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1179.627862] ? kmem_cache_alloc_trace+0x323/0x380 [ 1179.632897] ? copy_mount_options+0x26f/0x380 [ 1179.637396] ksys_mount+0xcf/0x130 [ 1179.640939] __x64_sys_mount+0xba/0x150 [ 1179.644917] do_syscall_64+0xf9/0x620 [ 1179.648722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1179.653907] RIP: 0033:0x460baa [ 1179.657112] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1179.676022] RSP: 002b:00007fa9be272a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1179.683824] RAX: ffffffffffffffda RBX: 00007fa9be272b10 RCX: 0000000000460baa [ 1179.691098] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa9be272ad0 [ 1179.698371] RBP: 00007fa9be272ad0 R08: 00007fa9be272b10 R09: 0000000020000000 [ 1179.705646] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1179.712924] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020010200 [ 1179.720249] Kernel Offset: disabled [ 1179.723865] Rebooting in 86400 seconds..