F_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x3fe00) 01:49:43 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x1, 0x0) write$dsp(r0, &(0x7f0000000500)='w', 0x1) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x80045002, &(0x7f0000000600)) 01:49:43 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:43 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/crypto\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 01:49:43 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0xc0045005, 0x0) 01:49:43 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18}, './file0\x00'}) [ 1593.159968][ T6444] loop2: detected capacity change from 0 to 1024 [ 1593.209772][ T6444] hfsplus: inconsistency in B*Tree (0,1,255,1,0) [ 1593.228775][ T6448] loop5: detected capacity change from 0 to 1024 [ 1593.232064][ T6444] hfsplus: failed to load root directory 01:49:43 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8010500d, &(0x7f0000000b40)) 01:49:43 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:43 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0xc0045005, 0x0) [ 1593.375106][ T6448] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1593.513754][ T6457] loop2: detected capacity change from 0 to 1024 [ 1593.545307][ T6457] hfsplus: inconsistency in B*Tree (256,1,255,1,0) 01:49:43 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3b1vG+cZAPDnKJoS3dZREjtxiwAWYiAtKtSWRCitprhFUWgIiiAdOnUgbDomTDupxBRKULRq+rV2yB+QDto6FehuIF26tFtWjgYKdMlSFShwxR2PFE2R+rAlkUp/P+P0vnfvve899/A+eCQMBvB/a30xyo8iifXFN7ey+c5OrdXZqT3o1SNiNiJKEeVuEcm/0zT9NOJWdKf4arawGC4Zt52Pm2tvf/Z553F3rlxM+fqlg/odzXYxxUJEzBRlX+nZxrtdlG88dXhJfw+zhF3vJQ4m7UJ2JqY9C2ma/vRvX+63DKiO6j13JjECpyvp3jf3mY+4WJzo2fuA7l3xaW6pU2Z70gEAAADAGXhuN3ZjKy5NOg4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4T4rf/0+KqdSrL0TS+/3/SrEsivp0uXa81R+dVhwAAAAAAAAAcIau7cZubMWl3nya5N/5v5rPXM7/finej81oxEbciK2oRzvasRHLETE/MFBlq95ubyz3e86N6DmT91wZ2XPlkEBni7J6UnsOAAAAAAAAAF8oH8X63vf/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDZKImYhyUY3LRZnMRylbOBcRlaxxO+Ifvfq5MDd68aOzjgMAAAAm4Lnd2I2tuNSbT5P8mf+l/Ll/Lt6Ph9GOZrSjFY24k38W0H3qL3V2aq3OTu1BNu0f97v/OlYY+YiRf/YwZstX8zWqcTea+ZIbcTvejVbciVLeM3O1F8/ouH6VxZS8UThiZHeKMtvzPxTlKRn8MKV6+OrzeUYu9DOyVMSWZeP5gzNxzFdneEvLUeoHe3loS4M7UTow5zNjt3exKLP9+d3p5vyYhjOxMnD0vXRwziO+/pc//fhe6+H9e3c3F6dnl46m92KlvQXDmajFRz95PNs9il/+Imdin6U8E1f68+vxg/hRLMZCvBUb0YyfRT3a0YiF+H5eqxfHczJwyo/J1K0n5t46LJJK8bp0X6yjxFQuVq7Hq3nfS9GMH8a7cSca8Xr+byWW49uxGquxNnCsX+ns1MqDsT8ZSH7Wl8ZcadOvjAz++jeKSnbp+/3+S+B/D9v705Pl9fmBvA5ec+fztsEle1l64eTvR+WvFZXs0Ph1cbWfDsOZWB7IxIsHZ+KP+WVls/Xw/sa9+ntH3N5rRZmdR789+l1i/G3nxGTHywtRfI0ydHRkbS+ObFvO2y7320r72q7027pn6vbYM7VSvIfbP9JK3vbyyLZa3nZ1oG3U+y0Apt7Fb16sVP9Z/Xv1k+pvqveqb859b/Y7s69U4sJfL0R5aea10ivJn+OT+MXe8z8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPD0Nj/48H691WpsDFXSNP3lmKbzXOn9CNBkw6jEdGTjmSrlY/X6T5qmxZJkCoI/pJIWpiWeAyvX4lRGnvCFCTh1N9sP3ru5+cGH32o+qL/TeKfxcG11dW1pbfX12s27zVZjqft3XO/y2QYLnKi9m/6kIwEAAAAAAAAAAACO6iz+o8Kk9xEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA439YXo/woklheurGUzXd2aq1s6tX31ixHRCkikp9HJJ9G3IruFPMDwyXjtvNxc+3tzz7vPN4bq9xbv3RQv5HKwwu2iykWImKmKJ/BE+Pdfubxkv4eZgm73kscTNr/AgAA///m8Qx3") [ 1593.574653][ T6457] hfsplus: failed to load root directory 01:49:43 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00'}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r3 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r3, r5, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x3fe00) 01:49:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000013c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001500), 0xffffffffffffffff) 01:49:44 executing program 3: bpf$MAP_CREATE_RINGBUF(0x3, 0x0, 0x0) 01:49:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)=@delnexthop={0x20, 0x69, 0x1, 0x0, 0x0, {}, [{0x8, 0x1, 0x2}]}, 0x20}}, 0x0) 01:49:44 executing program 1: rt_sigaction(0x3, &(0x7f00000001c0)={&(0x7f0000000100)="660f63e18f697c80806d54effa42a3000000800000000065019b0e000000c422412cb300000080c40279356b48c463294948e000f341aff75e226742f7a195000000", 0x0, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000002c0)) 01:49:44 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000100)={{0x5}}) [ 1593.828254][ T6463] loop2: detected capacity change from 0 to 1024 01:49:44 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) [ 1593.892399][ T6463] hfsplus: inconsistency in B*Tree (1024,1,255,1,0) [ 1593.922030][ T6463] hfsplus: failed to load root directory 01:49:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1593.959852][ T6471] loop5: detected capacity change from 0 to 1024 01:49:44 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000140)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000180)=ANY=[], &(0x7f0000001700)=0xe) 01:49:44 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRKg2a2dn1xt71R/yx6/T3i8bvO/PO+84zz3zth6IN4EtrdT7KjyKJ1fk3N7L5zlat1dmqPejVI2I6IkoR5W4RyX/TNP004lZ0p/h6trAYLhm1nY+bK29/9nnncXeuXEz5+qX9+h3OZjHFXERMFWVf6Xjj3S7KN546vKS/h1nCrvcSB+N2IbsS0565NE1//o+v9lsGVIf1njmTGIHTlXSfm3vMRlwsLvTsdUD3qfg0j9QJsznuAAAAAOAMPLcd27ERl8YdBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJwnxe//J8VU6tXnIun9/n+lWBZFfbJcO9rqj04rDgAAAAAAAAA4Q9e2Yzs24lJvPk3y7/xfzWcu53+/Eu/HejRiLW7ERtSjHe1Yi8WImB0YqLJRb7fXFvs9Z4b0nMp7Lg3tuXRAoNNFWT2pPQcAAAAAAACAZ8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGIq4ouiGpeLMpmNUjkiZiKikjVuRvyrVz8XZoYvfnTWcQAAAMAYPLcd27ERl3rzaZK/538pf98/E+/Hw2hHM9rRikbcyT8L6L7rL3W2aq3OVu1BNu0d9/v/OVIY+YiRf/YwYstX8zWqcTea+ZIbcTvejVbciVLeM3O1F8/wuH6TxZS8UThkZHeKMtvzPxXlKRn8MKV68OqzeUYu9DOyUMSWZeP5/TNxxKOze0uLUeoHe3nXlgZ3orRvzqdGbu9iUWb784fTzfkR7c7E0sDZ99L+OY/45t/+8tN7rYf3791dn5+cXTqc3sFKewt2Z6IWH/3s8XT3LH75Wc7EHgt5Jq7051fjR/GTmI+5eCvWohm/iHq0oxFz8cO8Vi/O52Tgkh+RqVtPzL11UCSV4rh0D9ZhYioXK9fj1bzvpWjGj+PduBONeD3/txSL8d1YjuVYGTjXr3S2auXB2J8MJL/qSyPutOnXhgZ//VtFJbv1/XHvLfCLg/b+9GR5fX4gr4P33Nm8bXDJTpZeOPnnUfkbRSU7NX5b3O0nw+5MLA5k4sX9M/Hn/Lay3np4f+1e/b1Dbu+1osyuo98f/ikx+rFzYrLz5YXsYOVzT54dWduLQ9sW87bL/bbSnrYr/bbulbo58kqtFK/h9o60lLe9PLStlrddHWgb9noLgIl38dsXK9V/V/9Z/aT6u+q96pszP5j+3vQrlbjw9wtRXph6rfRK8tf4JH618/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4eusffHi/3mo11nZV0jT99Yim81zp/QjQeMOoxGRk41iV8pF6/S9N02JJMgHBH1BJC5MSz76Va3EqI4/5xgScupvtB+/dXP/gw+80H9TfabzTeLiyvLyysLL8eu3m3WarsdD9O6p3+WyDBU7UzkN/3JEAAAAAAAAAAAAAh3UW/1Fh3PsIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnG+r81F+FEksLtxYyOY7W7VWNvXqO2uWI6IUEckvI5JPI25Fd4rZgeGSUdv5uLny9mefdx7vjFXurV/ar99Q5d0LNosp5iJiqiiP4Ynxbh97vKS/h1nCrvcSB+P2/wAAAP//lzANbw==") 01:49:44 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x44400, 0x0) 01:49:44 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0xc0045009, &(0x7f0000000600)) 01:49:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) [ 1594.217366][ T6471] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1594.401973][ T6490] loop2: detected capacity change from 0 to 1024 01:49:44 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x5016, 0x0) 01:49:44 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0505350, &(0x7f0000000040)={0x0, 0x0, 'client0\x00', 0x0, "c28a139d4092bcf2", "f291ea9e02556e72af89675e12402c0310155fa55c43ad073b57cd68c1a2a381"}) [ 1594.450272][ T6490] hfsplus: inconsistency in B*Tree (64512,1,255,1,0) [ 1594.488186][ T6490] hfsplus: failed to load root directory 01:49:44 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00'}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r3 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r3, r5, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x3fe00) 01:49:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000440), r0) 01:49:44 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}, 0xb}, 0x0) 01:49:45 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x500e, 0x0) 01:49:45 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000040)={0x3f, 0x0, 0x0, 'queue0\x00'}) [ 1594.863273][ T6506] loop2: detected capacity change from 0 to 1024 01:49:45 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x80045010, &(0x7f0000001080)) [ 1594.920131][ T6506] hfsplus: inconsistency in B*Tree (2,1,255,1,0) 01:49:45 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000004c0), 0x1, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x80045010, &(0x7f0000000600)) 01:49:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) [ 1594.977047][ T6506] hfsplus: failed to load root directory [ 1595.002982][ T6510] loop5: detected capacity change from 0 to 1024 01:49:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) [ 1595.168800][ T6510] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:45 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:45 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x0, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:45 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000100)) 01:49:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 01:49:45 executing program 4: bpf$MAP_CREATE_RINGBUF(0xc, &(0x7f0000001700), 0x48) [ 1595.453601][ T6527] loop2: detected capacity change from 0 to 1024 [ 1595.506092][ T6527] hfsplus: inconsistency in B*Tree (3,1,255,1,0) 01:49:45 executing program 3: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000b80), 0xffffffffffffffff) 01:49:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x7c, 0x0, 0x0) 01:49:45 executing program 0: sched_setscheduler(0x0, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x3ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000950000000000"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000001080)={0x2020}, 0x2020) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0)={0x2020}, 0x2020) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x200000005c831, 0xffffffffffffffff, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009800)=[{{&(0x7f0000001ac0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000082c0)=[{&(0x7f0000005fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000008340)=""/125, 0x7d}, 0x1ff}], 0x1, 0xa, 0x0) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) [ 1595.551803][ T6527] hfsplus: failed to load root directory 01:49:46 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3b1vG+cZAPDnKJoS3dZREjtxiwAWYiAtKtSWRCitprhFUWgIiiAdOnUgbDomTDupxBRKULRq+rV2yB+QDto6FehuIF26tFtWjgYKdMlSFShwxR2PFE2R+rAlkUp/P+P0vnfvve899/A+eCQMBvB/a30xyo8iifXFN7ey+c5OrdXZqT3o1SNiNiJKEeVuEcm/0zT9NOJWdKf4arawGC4Zt52Pm2tvf/Z553F3rlxM+fqlg/odzXYxxUJEzBRlX+nZxrtdlG88dXhJfw+zhF3vJQ4m7UJ2JqY9C2ma/vRvX+63DKiO6j13JjECpyvp3jf3mY+4WJzo2fuA7l3xaW6pU2Z70gEAAADAGXhuN3ZjKy5NOg4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4T4rf/0+KqdSrL0TS+/3/SrEsivp0uXa81R+dVhwAAAAAAAAAcIau7cZubMWl3nya5N/5v5rPXM7/finej81oxEbciK2oRzvasRHLETE/MFBlq95ubyz3e86N6DmT91wZ2XPlkEBni7J6UnsOAAAAAAAAAF8oH8X63vf/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDZKImYgod6txuSiT+Shly+YiopKttx3xj179XJgbvfjRWccBAAAAE/DcbuzGVlzqzadJ/sz/Uv7cPxfvx8NoRzPa0YpG3Mk/C+g+9Zc6O7VWZ6f2IJv2j/vdfx0rjHzE6H72MHrLV/M1qnE3mvmSG3E73o1W3IlS3jNztRfP6Lh+lcWUvFE4YmR3ijLb8z8U5SkZ/DClevjq83lGLvQzslTElmXj+YMzccxXZ3hLy1HqB3t5aEuDO1E6MOczY7d3sSiz/fnd6eb8mIYzsTJw9L10cM4jvv6XP/34Xuvh/Xt3NxenZ5eOpvdipb0Fw5moxUc/eTzbPYpf/iJnYp+lPBNX+vPr8YP4USzGQrwVG9GMn0U92tGIhfh+XqsXx3MycMqPydStJ+beOiySSvG6dF+so8RULlaux6t530vRjB/Gu3EnGvF6/m8lluPbsRqrsTZwrF/p7NTKg7E/GUh+1pfGXGnTr4wM/vo3ikp26fv9/kvgfw/b+9OT5fX5gbwOXnPn87bBJXtZeuHk70flrxWV7ND4dXG1nw7DmVgeyMSLB2fij/llZbP18P7Gvfp7R9zea0WZnUe/PfpdYvxt58Rkx8sLxbcow0dH1vbiyLblvO1yv620r+1Kv617pm6PPVMrxXu4/SOt5G0vj2yr5W1XB9pGvd8CYOpd/ObFSvWf1b9XP6n+pnqv+ubc92a/M/tKJS789UKUl2ZeK72S/Dk+iV/sPf8DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABPb/ODD+/XW63GxlAlTdNfjmk6z5XejwBNNoxKTEc2nqlSPlav/6RpWixJpiD4QyppYVriObByLU5l5AlfmIBTd7P94L2bmx98+K3mg/o7jXcaD9dWV9eW1lZfr92822w1lrp/x/Uun22wwInau+lPOhIAAAAAAAAAAADgqM7iPypMeh8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA8219McqPIonlpRtL2Xxnp9bKpl59b81yRJQiIvl5RPJpxK3oTjE/MFwybjsfN9fe/uzzzuO9scq99UsH9RupPLxgu5hiISJmivIZPDHe7WceL+nvYZaw673EwaT9LwAA///m7Qx3") 01:49:46 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x22, 0xf, {[@local=@item_4={0x3, 0x2, 0x0, "5821843f"}, @main=@item_4={0x3, 0x0, 0x0, "21958d7d"}, @global=@item_012={0x2, 0x1, 0x0, 'Lq'}, @local=@item_012={0x1, 0x2, 0x0, '4'}]}}, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000480)={0x0, 0xffffffff}) 01:49:46 executing program 3: mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) [ 1595.738482][ T6536] loop5: detected capacity change from 0 to 1024 01:49:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x2, 0x518, 0x2a8, 0x3a0, 0x0, 0xf0, 0xf0, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, 0x0, {[{{@ipv6={@private1, @ipv4={'\x00', '\xff\xff', @local}, [], [], 'macvlan1\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private0, @ipv4=@private}}}, {{@ipv6={@private1, @rand_addr=' \x01\x00', [], [], 'netpci0\x00', 'bond_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) [ 1595.843730][ T6543] loop2: detected capacity change from 0 to 1024 [ 1595.911264][ T6543] hfsplus: inconsistency in B*Tree (4,1,255,1,0) [ 1595.925308][ T6543] hfsplus: failed to load root directory [ 1595.967952][ T6536] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=@newqdisc={0x30, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x8100000000000000}, 0x0) [ 1596.155266][ T6863] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1596.324375][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! 01:49:46 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:46 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x0, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:46 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x14, 0x2b, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 01:49:46 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090003206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, &(0x7f00000008c0)=ANY=[@ANYBLOB="00000c0000000c0001"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x2c, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f00000005c0)={0x2c, &(0x7f00000006c0)=ANY=[@ANYBLOB="000004000000ba"], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000a00)={0x2c, &(0x7f0000000680)={0x0, 0x0, 0x4, "d3de200b"}, 0x0, 0x0, 0x0, 0x0}) [ 1596.452514][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 1596.635629][ T6562] loop2: detected capacity change from 0 to 1024 01:49:47 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440), 0x10) 01:49:47 executing program 0: sched_setscheduler(0x0, 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x3ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000950000000000"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000001080)={0x2020}, 0x2020) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0)={0x2020}, 0x2020) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x200000005c831, 0xffffffffffffffff, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009800)=[{{&(0x7f0000001ac0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000082c0)=[{&(0x7f0000005fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000008340)=""/125, 0x7d}, 0x1ff}], 0x1, 0xa, 0x0) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) [ 1596.710642][ T6562] hfsplus: inconsistency in B*Tree (5,1,255,1,0) [ 1596.730431][ T6562] hfsplus: failed to load root directory [ 1596.765447][ T6568] loop5: detected capacity change from 0 to 1024 01:49:47 executing program 1: r0 = openat$adsp1(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) read$dsp(r0, &(0x7f0000000340)=""/204, 0xcc) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000300)) 01:49:47 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1596.887650][ T6568] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1596.962301][ T8] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 1597.079089][ T6579] loop2: detected capacity change from 0 to 1024 01:49:47 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x0, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1597.138926][ T6579] hfsplus: inconsistency in B*Tree (6,1,255,1,0) [ 1597.145539][ T6579] hfsplus: failed to load root directory [ 1597.197771][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1597.222418][ T8] usb 4-1: Using ep0 maxpacket: 32 01:49:47 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGIqIma61bhalMlslMrF8kq23mbEP3r1C2Fm+OIn5x0HAAAAjMFz27EdG3GlN58m+Xv+l/L3/TPxfjyOdjSjHa1oxL38s4Duu/5SZ6vW6mzVHmXT/nG/+69jhZGPGN3PHoZv+Xq+RjXuRzNfcivuxrvRintRyntmrvfiGR7Xr7KYkjcKR4zsXlFme/6Hojwjgx+mVA9ffTbPyKV+RhaK2LJsPH9wJo55dPZuaTFK/WCv7tnS4E6UDsz51MjtXS7KbH9+d7Y5P6a9mVgaOPteOjjnEV//y59+/KD1+OGD++vzk7NLR9M7WGlvwd5M1OKjnzyd7p7FL3+RM7HPQp6Ja/351fhB/CjmYy7eirVoxs+iHu1oxFx8P6/Vi/M5GbjkR2Tqzq65tw6LpFIcl+7BOkpM5WLlerya970SzfhhvBv3ohGv5/+WYjG+HcuxHCsD5/q1zlatPBj77kDyq7404k6bfmVo8De/UVSyW9/v998C/3vY3p+dLK/PD+R18J47m7cNLtnJ0gun/zwqf62oZKfGr4u7/WTYm4nFgUy8eHAm/pjfVtZbjx+uPai/d8TtvVaU2XX026M/JUY/dk5Ndr68kB2sfG732ZG1vTi0bTFvu9pvK+1ru9Zv616pmyOv1ErxGm7/SEt528tD22p52/WBtmGvtwCYeJe/eblS/Wf179VPqr+pPqi+OfO96e9Mv1KJS3+9FOWFqddKryR/jk/iFzvv/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgGe3/sGHD+utVmNtTyVN01+OaLrIld6PAI03jEpMRjZOVCkfq9d/0jQtliQTEPwhlbQwKfEcWLkRZzLymG9MwJm73X703u31Dz78VvNR/Z3GO43HK8vLKwsry6/Xbt9vthoL3b+jepfPN1jgVO089McdCQAAAAAAAAAAAHBU5/EfFca9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDFtjof5SeRxOLCrYVsvrNVa2VTr76zZjkiShGR/Dwi+TTiTnSnmB0YLhm1nY+bK29/9nnn6c5Y5d76pYP6DVXeu2CzmGIuIqaK8gR2jXf3xOMl/T3MEnazlzgYt/8FAAD//7g3DHs=") [ 1597.352076][ T8] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1597.399332][ T8] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1597.428814][ T8] usb 4-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1597.433342][ T6587] loop5: detected capacity change from 0 to 1024 [ 1597.454417][ T8] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 01:49:47 executing program 0: syz_emit_ethernet(0x8e, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x58, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mptcp=@synack={0x1e, 0x10}, @mptcp=@synack={0x1e, 0x10}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 1597.496744][ T8] usb 4-1: config 0 descriptor?? [ 1597.528421][ T6589] loop2: detected capacity change from 0 to 1024 [ 1597.541102][ T6589] hfsplus: inconsistency in B*Tree (8,1,255,1,0) 01:49:47 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1597.593345][ T8] hub 4-1:0.0: USB hub found [ 1597.603494][ T6587] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1597.612034][ T6589] hfsplus: failed to load root directory 01:49:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8}]}, 0x2c}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r6, r5, 0x0, 0x10000a014) 01:49:48 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:48 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1597.811908][ T8] hub 4-1:0.0: 1 port detected [ 1597.883951][ T6598] loop2: detected capacity change from 0 to 1024 [ 1597.916985][ T6598] hfsplus: inconsistency in B*Tree (10,1,255,1,0) [ 1597.925485][ T6598] hfsplus: failed to load root directory 01:49:48 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1597.934468][ T28] audit: type=1804 audit(1708307388.289:764): pid=6597 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir4223471187/syzkaller.ICWVcl/1961/cgroup.controllers" dev="sda1" ino=1955 res=1 errno=0 [ 1597.986458][ T6603] loop5: detected capacity change from 0 to 1024 [ 1598.006667][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:49:48 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:48 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1598.144384][ T6603] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1598.293097][ T6608] loop2: detected capacity change from 0 to 1024 [ 1598.333559][ T6608] hfsplus: inconsistency in B*Tree (20,1,255,1,0) [ 1598.340349][ T6608] hfsplus: failed to load root directory 01:49:48 executing program 1: keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 01:49:48 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:48 executing program 1: keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1598.575768][ T6616] loop2: detected capacity change from 0 to 1024 [ 1598.597584][ T6613] loop5: detected capacity change from 0 to 1024 [ 1598.616680][ T6616] hfsplus: inconsistency in B*Tree (24,1,255,1,0) 01:49:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1598.653528][ T6616] hfsplus: failed to load root directory [ 1598.682255][ T8] hub 4-1:0.0: activate --> -90 01:49:49 executing program 1: keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1598.737835][ T6613] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:49 executing program 4: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0), &(0x7f0000000000)=0x98) r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x76, &(0x7f00000003c0)=@assoc_value={r2}, 0x8) 01:49:49 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:49 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:49 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1598.924232][ T6621] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1599.035526][ T6621] bridge0: entered promiscuous mode 01:49:49 executing program 4: write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{0x0}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) [ 1599.074131][ T6621] bridge0: left promiscuous mode 01:49:49 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 01:49:49 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGIqIua61bhalMlslMoRMRMRlWy9zYh/9OoXwszwxU/OOw4AAAAYg+e2Yzs24kpvPk3y9/wv5e/7Z+L9eBztaEY7WtGIe/lnAd13/aXOVq3V2ao9yqb94373X8cKIx8xup89DN/y9XyNatyPZr7kVtyNd6MV96KU98xc78UzPK5fZTElbxSOGNm9osz2/A9FeUYGP0ypHr76bJ6RS/2MLBSxZdl4/uBMHPPo7N3SYpT6wV7ds6XBnSgdmPOpkdu7XJTZ/vzubHN+THszsTRw9r10cM4jvv6XP/34Qevxwwf31+cnZ5eOpnew0t6CvZmoxUc/eTrdPYtf/iJnYp+FPBPX+vOr8YP4UczHXLwVa9GMn0U92tGIufh+XqsX53MycMmPyNSdXXNvHRZJpTgu3YN1lJjKxcr1eDXveyWa8cN4N+5FI17P/y3FYnw7lmM5VgbO9WudrVp5MPbdgeRXfWnEnTb9ytDgb36jqGS3vt/vvwX+97C9PztZXp8fyOvgPXc2bxtcspOlF07/eVT+WlHJTo1fF3f7ybA3E4sDmXjx4Ez8Mb+trLceP1x7UH/viNt7rSiz6+i3R39KjH7snJrsfHkhO1j53O6zI2t7cWjbYt52td9W2td2rd/WvVI3R16pleI13P6RlvK2l4e21fK26wNtw15vATDxLn/zcqX6z+rfq59Uf1N9UH1z5nvT35l+pRKX/nopygtTr5VeSf4cn8Qvdt7/AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAz279gw8f1lutxtqeSpqmvxzRdJErvR8BGm8YlZiMbJyoUj5Wr/+kaVosSSYg+EMqaWFS4jmwciPOZOQx35iAM3e7/ei92+sffPit5qP6O413Go9XlpdXFlaWX6/dvt9sNRa6f0f1Lp9vsMCp2nnojzsSAAAAAAAAAAAA4KjO4z8qjHsfAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgIttdT7KTyKJxYVbC9l8Z6vWyqZefWfNckSUIiL5eUTyacSd6E4xOzBcMmo7HzdX3v7s887TnbHKvfVLB/Ubqrx3wWYxxVxETBXlCewa7+6Jx0v6e5gl7GYvcTBu/wsAAP//n+QMkw==") [ 1599.115997][ T5162] usb 4-1: USB disconnect, device number 4 [ 1599.133899][ T8] usb 4-1-port1: attempt power cycle [ 1599.172311][ T6629] loop5: detected capacity change from 0 to 1024 [ 1599.234892][ T6634] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1599.281531][ T6629] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:49 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1599.354715][ T6637] loop2: detected capacity change from 0 to 1024 [ 1599.379073][ T6637] hfsplus: inconsistency in B*Tree (32,1,255,1,0) [ 1599.400432][ T6637] hfsplus: failed to load root directory [ 1599.417087][ T6634] batman_adv: batadv0: Adding interface: team0 [ 1599.425000][ T6634] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 01:49:49 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0), 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1599.451556][ T6634] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 1599.572607][ T6642] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:50 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) 01:49:50 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)) keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 01:49:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:50 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000e15000)={0x2, 0x4e20}, 0x10) [ 1599.727901][ T6642] bridge0: entered promiscuous mode [ 1599.825270][ T6642] bridge0: left promiscuous mode 01:49:50 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)) keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1599.857626][ T6647] loop5: detected capacity change from 0 to 1024 [ 1599.873729][ T6645] loop2: detected capacity change from 0 to 1024 01:49:50 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0xd20b}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:49:50 executing program 3: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bf", 0x5, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1599.940924][ T6645] hfsplus: inconsistency in B*Tree (32,1,255,1,0) [ 1599.988778][ T6645] hfsplus: failed to load root directory 01:49:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1600.034519][ T6647] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1600.100463][ T6656] batadv0: entered promiscuous mode 01:49:50 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)) keyctl$dh_compute(0x1c, &(0x7f0000000140), &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1600.129886][ T6656] macvlan2: entered allmulticast mode [ 1600.153135][ T6656] batadv0: entered allmulticast mode 01:49:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontxQWfGhBCPlSoKgdOHFbJplllkxZ7i9wKgSlfVw79A8rBN05I3COVCxe49brHSEhcesFISINmdna9sXf9EX/sOv39ovH7zrzzvvPMM1/7oWgD+MJanY/yo0hidf7NjWy+s1VrdbZqD3r1iJiOiFJEuVtE8p80TT+NuBXdKb6aLSyGS0Zt5+Pmytuffd553J0rF1O+fmm/foezWUwxFxFTRdlXOt54t4vyjacOL+nvYZaw673EwbhdyK7EtGcuTdOf/f3L/ZYB1WG9Z84kRuB0Jd3n5h6zEReLCz17HdB9Kj7NI3XCbI47AAAAADgDz23HdmzEpXHHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOdJ8fv/STGVevW5SHq//18plkVRnyzXjrb6o9OKAwAAAAAAAADO0LXt2I6NuNSbT5P8O/9X85nL+d8vxfuxHo1YixuxEfVoRzvWYjEiZgcGqmzU2+21xX7PmSE9p/KeS0N7Lh0Q6HRRVk9qzwEAAAAAAADgmfJRrO58/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJMgiZiKiG93q3G5KJPZKJUjYiYiKtl6mxH/7NXPhZnhix+ddRwAAAAwBs9tx3ZsxKXefJrk7/lfyt/3z8T78TDa0Yx2tKIRd/LPArrv+kudrVqrs1V7kE17x/3ev48URj5idD97GL7lq/ka1bgbzXzJjbgd70Yr7kQp75m52otneFy/zmJK3igcMrI7RZnt+R+L8pQMfphSPXj12TwjF/oZWShiy7Lx/P6ZOOLR2b2lxSj1g728a0uDO1HaN+dTI7d3sSiz/fn96eb8iHZnYmng7Htp/5xHfP2vf/7JvdbD+/furs9Pzi4dTu9gpb0FuzNRi49++ni6exa//CxnYo+FPBNX+vOr8cP4cczHXLwVa9GMn0c92tGIufhBXqsX53MycMmPyNStJ+beOiiSSnFcugfrMDGVi5Xr8Wre91I040fxbtyJRrye/1uKxfhOLMdyrAyc61c6W7XyYOxPBpJf9aURd9r0K0ODv/6NopLd+v6w9xb4v4P2/vRkeX1+IK+D99zZvG1wyU6WXjj551H5a0UlOzV+U9ztJ8PuTCwOZOLF/TPxp/y2st56eH/tXv29Q27vtaLMrqPfHf4pMfqxc2Ky8+WF7GDlc0+eHVnbi0PbFvO2y/220p62K/227pW6OfJKrRSv4faOtJS3vTy0rZa3XR1oG/Z6C4CJd/GbFyvVf1X/Uf2k+tvqveqbM9+f/u70K5W48LcLUV6Yeq30SvKX+CR+ufP+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeHrrH3x4v95qNdZ2VdI0/dWIpvNc6f0I0HjDqMRkZONYlfKRev03TdNiSTIBwR9QSQuTEs++lWtxKiOP+cYEnLqb7Qfv3Vz/4MNvNR/U32m803i4sry8srCy/Hrt5t1mq7HQ/Tuqd/lsgwVO1M5Df9yRAAAAAAAAAAAAAId1Fv9RYdz7CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJxvq/NRfhRJLC7cWMjmO1u1Vjb16jtrliOiFBHJLyKSTyNuRXeK2YHhklHb+bi58vZnn3ce74xV7q1f2q/fUOXdCzaLKeYiYqooj+GJ8W4fe7ykv4dZwq73Egfj9v8AAAD//7ZHDKc=") [ 1600.187775][ T6656] 8021q: adding VLAN 0 to HW filter on device macvlan2 01:49:50 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0), 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1600.245137][ T6664] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:50 executing program 4: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)="27571a") prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bf", 0x5, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1600.353537][ T6664] bridge0: entered promiscuous mode 01:49:50 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 1600.403831][ T6668] loop2: detected capacity change from 0 to 1024 [ 1600.444335][ T6668] hfsplus: inconsistency in B*Tree (52,1,255,1,0) [ 1600.473100][ T6664] bridge0: left promiscuous mode [ 1600.481957][ T6668] hfsplus: failed to load root directory 01:49:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1600.629921][ T6673] loop5: detected capacity change from 0 to 1024 01:49:51 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) 01:49:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1600.815998][ T6673] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1600.873737][ T6678] loop2: detected capacity change from 0 to 1024 [ 1600.960436][ T6678] hfsplus: inconsistency in B*Tree (62,1,255,1,0) 01:49:51 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 1601.004594][ T6678] hfsplus: failed to load root directory [ 1601.101816][ T6684] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:51 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0), 0x0, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1601.203677][ T6683] bridge0: entered promiscuous mode 01:49:51 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:51 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), 0x0, 0x0, 0x0) [ 1601.345241][ T6683] bridge0: left promiscuous mode 01:49:51 executing program 3: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bf", 0x5, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 01:49:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 1601.542378][ T6690] loop5: detected capacity change from 0 to 1024 [ 1601.560754][ T6689] loop2: detected capacity change from 0 to 1024 [ 1601.636883][ T6689] hfsplus: inconsistency in B*Tree (63,1,255,1,0) 01:49:52 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), 0x0, 0x0, 0x0) [ 1601.682744][ T6689] hfsplus: failed to load root directory [ 1601.753553][ T6690] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:52 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="120100006f92b90857152077ebb7000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000140)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x40, 0x13, 0x6, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f00000009c0)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x40, 0x19, 0x2, '-\x00'}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000040)={0x2c, &(0x7f0000000080)={0x0, 0x0, 0x1, "e2"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 01:49:52 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGIqIu50q3G1KJPZKJUjYiYiKtl6mxH/6NUvhJnhi5+cdxwAAAAwBs9tx3ZsxJXefJrk7/lfyt/3z8T78Tja0Yx2tKIR9/LPArrv+kudrVqrs1V7lE37x/3uv44VRj5idD97GL7l6/ka1bgfzXzJrbgb70Yr7kUp75m53otneFy/ymJK3igcMbJ7RZnt+R+K8owMfphSPXz12Twjl/oZWShiy7Lx/MGZOObR2bulxSj1g726Z0uDO1E6MOdTI7d3uSiz/fnd2eb8mPZmYmng7Hvp4JxHfP0vf/rxg9bjhw/ur89Pzi4dTe9gpb0FezNRi49+8nS6exa//EXOxD4LeSau9edX4wfxo5iPuXgr1qIZP4t6tKMRc/H9vFYvzudk4JIfkak7u+beOiySSnFcugfrKDGVi5Xr8Wre90o044fxbtyLRrye/1uKxfh2LMdyrAyc69c6W7XyYOy7A8mv+tKIO236laHB3/xGUclufb/ffwv872F7f3ayvD4/kNfBe+5s3ja4ZCdLL5z+86j8taKSnRq/Lu72k2FvJhYHMvHiwZn4Y35bWW89frj2oP7eEbf3WlFm19Fvj/6UGP3YOTXZ+fJCdrDyud1nR9b24tC2xbztar+ttK/tWr+te6VujrxSK8VruP0jLeVtLw9tq+Vt1wfahr3eAmDiXf7m5Ur1n9W/Vz+p/qb6oPrmzPemvzP9SiUu/fVSlBemXiu9kvw5Polf7Lz/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnt36Bx8+rLdajbU9lTRNfzmi6SJXej8CNN4wKjEZ2ThRpXysXv9J07RYkkxA8IdU0sKkxHNg5UacychjvjEBZ+52+9F7t9c/+PBbzUf1dxrvNB6vLC+vLKwsv167fb/Zaix0/47qXT7fYIFTtfPQH3ckAAAAAAAAAAAAwFGdx39UGPc+AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABfb6nyUn0QSiwu3FrL5zlatlU29+s6a5YgoRUTy84jk04g70Z1idmC4ZNR2Pm6uvP3Z552nO2OVe+uXDuo3VHnvgs1iirmImCrKE9g13t0Tj5f09zBL2M1e4mDc/hcAAP//KiUMsw==") 01:49:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:52 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') keyctl$dh_compute(0x1c, &(0x7f0000000140), 0x0, 0x0, 0x0) 01:49:52 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416", 0x7e, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1602.036935][ T6707] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1602.128314][ T6706] loop2: detected capacity change from 0 to 1024 [ 1602.173763][ T6706] hfsplus: inconsistency in B*Tree (64,1,255,1,0) [ 1602.182779][ T6706] hfsplus: failed to load root directory 01:49:52 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendto$packet(r0, &(0x7f00000002c0)='\v', 0x1, 0x0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) [ 1602.447095][ T6712] loop2: detected capacity change from 0 to 1024 [ 1602.467498][ T6715] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1602.506091][ T6712] hfsplus: inconsistency in B*Tree (65,1,255,1,0) [ 1602.524807][ T6716] loop5: detected capacity change from 0 to 1024 01:49:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1602.547875][ T6712] hfsplus: failed to load root directory 01:49:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffff00f687000000", @ANYRES32=r3, @ANYBLOB="01000000010000f31b0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000800)="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", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) 01:49:53 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1602.732643][ T6723] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1602.748238][ T6716] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1602.785675][ T6725] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 01:49:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1602.886499][ T6726] loop2: detected capacity change from 0 to 1024 [ 1602.953124][ T6726] hfsplus: inconsistency in B*Tree (65535,1,255,1,0) [ 1602.992451][ T6726] hfsplus: failed to load root directory 01:49:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e23, @empty}], 0x10) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)={0x0, 0x0, 0x1f4}, 0x8) [ 1602.999928][ T6729] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:53 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416", 0x7e, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:53 executing program 3: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bf", 0x5, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 01:49:53 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1603.210670][ T6733] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1603.412808][ T6739] loop5: detected capacity change from 0 to 1024 [ 1603.455388][ T6740] loop2: detected capacity change from 0 to 1024 [ 1603.509125][ T6740] hfsplus: failed to load root directory [ 1603.518371][ T6743] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:54 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1603.667621][ T6739] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1603.858460][ T6750] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1603.862183][ T6749] loop2: detected capacity change from 0 to 1024 [ 1603.887652][ T6749] hfsplus: request for non-existent node 256 in B*Tree 01:49:54 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416", 0x7e, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1603.908163][ T6749] hfsplus: request for non-existent node 256 in B*Tree [ 1603.942354][ T6749] hfsplus: failed to load root directory [ 1603.986345][ T6750] bridge0: entered promiscuous mode 01:49:54 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:54 executing program 1: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0x40184810, &(0x7f0000000480)={0x2, 0xffffffff}) [ 1604.228857][ T6754] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1604.252104][ T6755] loop5: detected capacity change from 0 to 1024 01:49:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1604.329336][ T6756] loop2: detected capacity change from 0 to 1024 [ 1604.400349][ T6755] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1604.406134][ T6756] hfsplus: request for non-existent node 1024 in B*Tree [ 1604.445986][ T6761] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1604.473491][ T6756] hfsplus: request for non-existent node 1024 in B*Tree 01:49:54 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566", 0xbd, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1604.538953][ T6756] hfsplus: failed to load root directory 01:49:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1604.597567][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:49:55 executing program 3: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bf", 0x5, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 01:49:55 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1604.766081][ T6766] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1604.791920][ T6765] loop5: detected capacity change from 0 to 1024 01:49:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1604.901779][ T6770] loop2: detected capacity change from 0 to 1024 01:49:55 executing program 4: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)="27571a34f8") prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bfab", 0x6, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1604.943457][ T6770] hfsplus: request for non-existent node 64512 in B*Tree [ 1604.969173][ T6765] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1604.973332][ T6770] hfsplus: request for non-existent node 64512 in B*Tree 01:49:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x80000000000802, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f5261aa51acb1d59e0a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x34, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}}, 0x0) [ 1605.038528][ T6770] hfsplus: failed to load root directory [ 1605.067611][ T6775] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:55 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1605.180123][ T6780] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:49:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:55 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566", 0xbd, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1605.417066][ T6787] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1605.440779][ T6785] loop2: detected capacity change from 0 to 1024 [ 1605.511811][ T6785] hfsplus: failed to load root directory 01:49:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWSETELEM={0x18, 0xc, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x40}}, 0x0) 01:49:56 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1605.721480][ T6789] loop5: detected capacity change from 0 to 1024 [ 1605.811027][ T6793] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:56 executing program 1: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)='\'') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)="036bc089bfabb97b650c", 0xa, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 1606.015304][ T6795] loop2: detected capacity change from 0 to 1024 [ 1606.052373][ T6789] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1606.125856][ T6798] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1606.134634][ T6795] hfsplus: failed to load root directory 01:49:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:56 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566", 0xbd, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:56 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1606.367060][ T6803] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1606.405351][ T6804] loop2: detected capacity change from 0 to 1024 01:49:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1606.440284][ T6804] hfsplus: failed to load root directory 01:49:56 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000dc0)=""/199, 0xc7}, {0x0}], 0x2) [ 1606.662993][ T6808] loop5: detected capacity change from 0 to 1024 01:49:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1606.848454][ T6812] loop2: detected capacity change from 0 to 1024 [ 1606.903933][ T6812] hfsplus: failed to load root directory 01:49:57 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x89, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 1606.945611][ T1237] ieee802154 phy0 wpan0: encryption failed: -22 [ 1606.953097][ T1237] ieee802154 phy1 wpan1: encryption failed: -22 [ 1606.984707][ T6808] xt_CT: You must specify a L4 protocol and not use inversions on it 01:49:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:57 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090003206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, &(0x7f00000008c0)=ANY=[@ANYBLOB="00000c0000000c0001"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) [ 1607.053334][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:49:57 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:57 executing program 4: rt_sigtimedwait(&(0x7f0000000100), 0x0, &(0x7f00000000c0), 0x8) 01:49:57 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e", 0xdc, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) write$nbd(0xffffffffffffffff, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @remote, 0x7}}}, 0x90) [ 1607.420323][ T6828] loop2: detected capacity change from 0 to 1024 [ 1607.470828][ T6828] hfsplus: failed to load root directory [ 1607.530221][ T5162] usb 4-1: new high-speed USB device number 9 using dummy_hcd 01:49:57 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) write$nbd(0xffffffffffffffff, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1607.616501][ T6834] loop5: detected capacity change from 0 to 1024 01:49:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002f80)=[{{&(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}], 0x18}}], 0x1, 0x0) [ 1607.726937][ T6834] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1607.756677][ T6837] loop2: detected capacity change from 0 to 1024 [ 1607.797260][ T6837] hfsplus: request for non-existent node 8 in B*Tree [ 1607.805017][ T5162] usb 4-1: Using ep0 maxpacket: 32 [ 1607.832006][ T6837] hfsplus: request for non-existent node 8 in B*Tree [ 1607.859273][ T6837] hfsplus: failed to load root directory 01:49:58 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090003206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, &(0x7f00000008c0)=ANY=[@ANYBLOB="00000c0000000c0001"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x2c, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f00000015c0)={0x2c, &(0x7f0000001440)={0x0, 0x0, 0x4, "23122b82"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001480)={0x84, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x20, 0x0, 0x4, {0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000a00)={0x2c, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000380)={0x0, 0x0, 0x4, "4589f446"}, 0x0, 0x0, 0x0, 0x0}) 01:49:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) write$nbd(0xffffffffffffffff, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:58 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:58 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e", 0xdc, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1607.952176][ T5162] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1608.001425][ T5162] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 01:49:58 executing program 4: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$IOCTL_VMCI_SET_NOTIFY(r0, 0x7cb, 0x0) [ 1608.083517][ T5162] usb 4-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1608.124169][ T5162] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1608.170047][ T5162] usb 4-1: config 0 descriptor?? 01:49:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:49:58 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) [ 1608.244886][ T6850] loop5: detected capacity change from 0 to 1024 [ 1608.262383][ T5162] hub 4-1:0.0: USB hub found [ 1608.335111][ T6851] loop2: detected capacity change from 0 to 1024 [ 1608.355502][ T6854] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1608.390812][ T6850] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1608.409835][ T6851] hfsplus: request for non-existent node 10 in B*Tree [ 1608.422203][ T5164] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 1608.443115][ T6851] hfsplus: request for non-existent node 10 in B*Tree [ 1608.482310][ T6851] hfsplus: failed to load root directory 01:49:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x2, 0x540, 0x2a8, 0x3a0, 0x0, 0xf0, 0xf0, 0x498, 0x498, 0x498, 0x498, 0x2a8, 0x6, 0x0, {[{{@ipv6={@private1, @ipv4={'\x00', '\xff\xff', @local}, [], [], 'macvlan1\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private0, @ipv4=@private}}}, {{@ipv6={@private1, @rand_addr=' \x01\x00', [], [], 'netpci0\x00', 'bond_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) 01:49:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1608.492421][ T5162] hub 4-1:0.0: 1 port detected 01:49:58 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12013f00000000407f04ffff0000000000010902"], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x22, 0x5, {[@main=@item_4={0x3, 0x0, 0x9, "21958d7d"}]}}, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480d, &(0x7f0000000480)={0x2, 0xffffffff}) 01:49:58 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e", 0xdc, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:49:58 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1608.638345][ T6862] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1608.701747][ T5164] usb 2-1: Using ep0 maxpacket: 32 01:49:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1608.761825][ T5162] hub 4-1:0.0: hub_hub_status failed (err = -71) [ 1608.784169][ T6866] loop2: detected capacity change from 0 to 1024 [ 1608.793262][ T5162] hub 4-1:0.0: config failed, can't get hub status (err -71) [ 1608.834237][ T6866] hfsplus: request for non-existent node 20 in B*Tree [ 1608.854167][ T6866] hfsplus: request for non-existent node 20 in B*Tree [ 1608.858699][ T6871] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1608.870937][ T6866] hfsplus: failed to load root directory [ 1608.877757][ T5164] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1608.888823][ T5164] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1608.901245][ T5164] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1608.914903][ T6869] loop5: detected capacity change from 0 to 1024 [ 1608.916954][ T5164] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 01:49:59 executing program 0: readv(0xffffffffffffffff, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1608.929466][ T5162] usbhid 4-1:0.0: can't add hid device: -71 [ 1608.933465][ T5164] usb 2-1: config 0 descriptor?? [ 1608.950842][ T5162] usbhid: probe of 4-1:0.0 failed with error -71 [ 1608.959511][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1608.976265][ T5164] hub 2-1:0.0: USB hub found [ 1609.030130][ T6869] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1609.038148][ T5162] usb 4-1: USB disconnect, device number 9 01:49:59 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:49:59 executing program 0: readv(0xffffffffffffffff, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1609.115458][ T6875] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:59 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8", 0xec, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1609.193418][ T5164] hub 2-1:0.0: 1 port detected 01:49:59 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1609.289525][ T6879] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1609.291998][ T6878] loop2: detected capacity change from 0 to 1024 01:49:59 executing program 0: readv(0xffffffffffffffff, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1609.334908][ T6878] hfsplus: request for non-existent node 24 in B*Tree [ 1609.370278][ T6878] hfsplus: request for non-existent node 24 in B*Tree [ 1609.403513][ T6878] hfsplus: failed to load root directory 01:49:59 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1609.455398][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1609.494475][ T6883] loop5: detected capacity change from 0 to 1024 01:49:59 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1609.529744][ T6885] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:49:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1609.664926][ T6883] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:00 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:00 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8", 0xec, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1609.750667][ T6892] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1609.956223][ T6898] loop5: detected capacity change from 0 to 1024 [ 1609.962790][ T6896] loop2: detected capacity change from 0 to 1024 [ 1609.990191][ T6901] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1610.008534][ T6896] hfsplus: request for non-existent node 32 in B*Tree [ 1610.027162][ T6896] hfsplus: request for non-existent node 32 in B*Tree [ 1610.041563][ T6896] hfsplus: failed to load root directory 01:50:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:00 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1610.149324][ T6898] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1610.268633][ T6909] loop2: detected capacity change from 0 to 1024 [ 1610.279926][ T6910] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:00 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8", 0xec, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1610.315229][ T6909] hfsplus: request for non-existent node 33554464 in B*Tree [ 1610.332059][ T6909] hfsplus: request for non-existent node 33554464 in B*Tree [ 1610.371980][ T6909] hfsplus: failed to load root directory [ 1610.523753][ T6914] loop5: detected capacity change from 0 to 1024 [ 1610.614817][ T6914] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1610.824632][T30409] hub 2-1:0.0: activate --> -90 [ 1611.141853][T30409] hub 2-1:0.0: hub_ext_port_status failed (err = 0) [ 1611.782769][ T8] usb 2-1: USB disconnect, device number 14 01:50:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000007c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @dev}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfffffeff}}], 0x18}}], 0x1, 0x0) 01:50:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:02 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:02 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:02 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c", 0xf4, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:02 executing program 4: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32=r3, @ANYBLOB="ddffff3504000000140012000c000100627269646765"], 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x281}]}, 0x34}}, 0x0) [ 1612.377661][ T6919] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1612.416751][ T6923] loop5: detected capacity change from 0 to 1024 [ 1612.421281][ T6922] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 01:50:02 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000008c0)=ANY=[@ANYBLOB="60000000110001002cbd7000fedbdf2500000000", @ANYRES32, @ANYBLOB="0030010000010000080028009458000008001b0000100000080013"], 0x60}}, 0x0) [ 1612.479238][ T6925] loop2: detected capacity change from 0 to 1024 [ 1612.535188][ T6925] hfsplus: request for non-existent node 52 in B*Tree [ 1612.561059][ T6925] hfsplus: request for non-existent node 52 in B*Tree [ 1612.573084][ T6934] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 01:50:03 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'pimreg\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b"]}) 01:50:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1612.611801][ T6925] hfsplus: failed to load root directory [ 1612.617629][ T6923] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:03 executing program 1: syz_emit_ethernet(0x8e, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4, 0x21, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x16, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@synack={0x1e, 0x10}, @mptcp=@synack={0x1e, 0x10}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 01:50:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:03 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1612.776602][ T6941] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:03 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c", 0xf4, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:03 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={@cgroup, 0xffffffffffffffff, 0x2b, 0x28, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(0xffffffffffffffff, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1613.002308][ T6951] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1613.060890][ T6948] loop2: detected capacity change from 0 to 1024 [ 1613.095083][ T6948] hfsplus: request for non-existent node 62 in B*Tree 01:50:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x0, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:03 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x32) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)) [ 1613.115051][ T6948] hfsplus: request for non-existent node 62 in B*Tree [ 1613.135546][ T6955] loop5: detected capacity change from 0 to 1024 [ 1613.141832][ T6948] hfsplus: failed to load root directory 01:50:03 executing program 1: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x26, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:03 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+JSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6Y+/6I/7Ydfj9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lx5HE6vxbG9l8Z6vW6mzVHvbqETEdEaWIcreI5N9pmn4WcTu6U3w1W1gMl4zazifNlXc+/6LzpDtXLqZ8/dJ+/Q5ns5hiLiKmirKvdLzx7hTlrWcOL+nvYZaw673EwbhdyK7EtGcuTdOf/u3L/ZYB1WG9Z84kRuB0Jd3n5h6zEReLCz17HdB9Kj7LI3XCbI47AAAAADgDL2zHdmzEpXHHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOdJ8fv/STGVevW5SHq//18plkVRnyzXjrb649OKAwAAAAAAAADO0LXt2I6NuNSbT5P8O//X85nL+d8vxQexHo1YixuxEfVoRzvWYjEiZgcGqmzU2+21xX7PmSE9p/KeS0N7Lh0Q6HRRVk9qzwEAAAAAAADgufJxrO58/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJMgiZjqFnErIi4X9WQ2SuWImImISrbeZsQ/evVzYWb44sdnHQcAAACMwQvbsR0bcak3nyb5e/5X8vf9M/FBPIp2NKMdrWjE3fyzgO67/lJnq9bqbNUeZtPecb/7ryOFkY8Y3c8ehm/5ar5GNe5FM19yI+7Ee9GKu1HKe2au9uIZHtevspiSW4VDRna3KLM9/0NRnpLBD1OqB68+m2fkQj8jC0VsWTZe3D8TRzw6u7e0GKV+sJd3bWlwJ0r75nxq5PYuFmW2P7873Zwf0e5MLA2cfa/sn/OIr//lTz++33r04P699fnJ2aXD6R2stLdgdyZq8fFPnkx3z+JXn+dM7LGQZ+JKf341fhA/ivmYi7djLZrxs6hHOxoxF9/Pa/XifE4GLvkRmbr91NzbB0VSKY5L92AdJqZysXI9Xs/7Xopm/DDei7vRiDfzf0uxGN+O5ViOlYFz/Upnq1YejP3pQPKrvjTiTpt+ZWjw179RVLJb3+/33gL/e9Den54sry8O5HXwnjubtw0u2cnSSyf/PCp/rahkp8avi7v9ZNidicWBTLy8fyb+mN9W1luPHqzdr79/yO29UZTZdfTbwz8lRj92Tkx2vryUHax87umzI2t7eWjbYt52ud9W2tN2pd/WvVI3R16pleI13N6RlvK2V4e21fK2qwNtw15vATDxLn7zYqX6z+rfq59Wf1O9X31r5nvT35l+rRIX/nohygtTb5ReS/4cn8Yvdt7/AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAz279w48e1FutxtquSpqmvxzRdJ4rvR8BGm8YlZiMbByrUj5Sr/+kaVosSSYg+AMqaWFS4tm3ci1OZeQx35iAU3ez/fD9m+sffvSt5sP6u413G49WlpdXFlaW36zdvNdsNRa6f0f1Lp9tsMCJ2nnojzsSAAAAAAAAAAAA4LDO4j8qjHsfAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgPNtdT7KjyOJxYUbC9l8Z6vWyqZefWfNckSUIiL5eUTyWcTt6E4xOzBcMmo7nzRX3vn8i86TnbHKvfVL+/Ubqrx7wWYxxVxETBXlMTw13p1jj5f09zBL2PVe4mDc/hcAAP//tNMMsg==") 01:50:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1613.289521][ T6962] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:03 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000dc0)={@ifindex, 0xffffffffffffffff, 0x16, 0x20}, 0x20) [ 1613.336112][ T6955] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) accept4$inet6(r0, 0x0, 0x0, 0x0) setsockopt(r1, 0x0, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x0, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1613.463645][ T6968] loop2: detected capacity change from 0 to 1024 01:50:03 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c", 0xf4, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1613.544269][ T6968] hfsplus: request for non-existent node 63 in B*Tree [ 1613.564085][ T6968] hfsplus: request for non-existent node 63 in B*Tree 01:50:04 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:04 executing program 4: bpf$BPF_PROG_ATTACH(0x12, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) [ 1613.598738][ T6968] hfsplus: failed to load root directory [ 1613.686410][ T6976] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:04 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:04 executing program 1: r0 = socket(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) [ 1613.766596][ T6979] loop5: detected capacity change from 0 to 1024 01:50:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x0, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x40, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x62}, @val={0x10, 0x3, r3}, @val={0xc}}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8}, @NL80211_ATTR_VENDOR_ID={0x8}]}, 0x40}}, 0x0) 01:50:04 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xffffffffffffffff) [ 1613.973076][ T6979] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1613.998136][ T6989] loop2: detected capacity change from 0 to 1024 [ 1614.008484][ T6992] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1614.046092][ T6989] hfsplus: request for non-existent node 64 in B*Tree [ 1614.083776][ T6989] hfsplus: request for non-existent node 64 in B*Tree 01:50:04 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a", 0xf8, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0x0, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1614.114194][ T6996] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1614.134513][ T6989] hfsplus: failed to load root directory [ 1614.139131][ T6996] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 01:50:04 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:04 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:04 executing program 4: r0 = socket(0x2c, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) 01:50:04 executing program 1: bpf$BPF_PROG_ATTACH(0x7, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_id}, 0x10) [ 1614.354940][ T7001] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0x0, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:04 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x5) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:04 executing program 1: bpf$BPF_PROG_ATTACH(0x7, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x25, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) [ 1614.475350][ T7003] loop5: detected capacity change from 0 to 1024 [ 1614.502218][ T7007] loop2: detected capacity change from 0 to 1024 01:50:04 executing program 4: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, 0x0, &(0x7f0000000040)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000001c0)={0x80000000, &(0x7f0000000100), &(0x7f0000000140)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000002c0)={0x80000000, &(0x7f0000000200), 0x0}) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000300)={{r0, 0x0, 0x1, [0x5, 0x6c8]}, {0x80000000, 0x0, 0x0, [0x0, 0x500000]}, 0x1, [0x3, 0xf4]}) syz_open_dev$media(&(0x7f0000000340), 0x0, 0x0) syz_open_dev$dri(&(0x7f00000004c0), 0x0, 0x40400) syz_clone(0x0, &(0x7f00000021c0)="d4a5634e02bcaeb0350d1c911d0a7f6e57faaf28f76a1d8a9bd1d08dd9e48f956ad72d80220ca02d2c9c0744d96ca675c5e30328e90982e81709a93b941dd66f3016f9c6a4f4c78deb6b21adcf0f6c4d1341eb1a963acb6ab6679385a9e76a94ec83a6df8a363f521e93f038778644589f9653283c5da446cb0af540dc03e2d4114d2065d81845f2b3b0c1e1b0490d75ca2415d699cf1a05a7fb2c856e2294a71235f150945b5b44dd9ae1045859f4ae9d0db25bcdeed81a460c874cdb556f8d1400abd45ba81ea09addd160b445ac8234bcfc672832dd2b53", 0xd9, &(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) getrusage(0x0, &(0x7f0000002400)) [ 1614.569338][ T7007] hfsplus: request for non-existent node 65 in B*Tree [ 1614.581472][ T7007] hfsplus: request for non-existent node 65 in B*Tree [ 1614.622207][ T7007] hfsplus: failed to load root directory [ 1614.653934][ T7015] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:05 executing program 1: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000cc0)={@ifindex, 0xffffffffffffffff, 0x1, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:05 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGIqK9I0TSPiandRJLNRKkfETERUsvU2I/7Rq18IM8MXPznvOAAAAGAMntuO7diIK735NMnf87+Uv++fiffjcbSjGe1oRSPu5Z8FdN/1lzpbtVZnq/Yom/aP+91/HSuMfMTofvYwfMvX8zWqcT+a+ZJbcTfejVbci1LeM3O9F8/wuH6VxZS8UThiZPeKMtvzPxTlGRn8MKV6+OqzeUYu9TOyUMSWZeP5gzNxzKOzd0uLUeoHe3XPlgZ3onRgzqdGbu9yUWb787uzzfkx7c3E0sDZ99LBOY/4+l/+9OMHrccPH9xfn5+cXTqa3sFKewv2ZqIWH/3k6XT3LH75i5yJfRbyTFzrz6/GD+JHMR9z8VasRTN+FvVoRyPm4vt5rV6cz8nAJT8iU3d2zb11WCSV4rh0D9ZRYioXK9fj1bzvlWjGD+PduBeNeD3/txSL8e1YjuVYGTjXr3W2auXB2HcHkl/1pRF32vQrQ4O/+Y2ikt36fr//Fvjfw/b+7GR5fX4gr4P33Nm8bXDJTpZeOP3nUflrRSU7NX5d3O0nw95MLA5k4sWDM/HH/Lay3nr8cO1B/b0jbu+1osyuo98e/Skx+rFzarLz5YXsYOVzu8+OrO3FoW2LedvVfltpX9u1flv3St0ceaVWitdw+0daytteHtpWy9uuD7QNe70FwMS7/M3Lleo/q3+vflL9TfVB9c2Z701/Z/qVSlz666UoL0y9Vnol+XN8Er/Yef8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8u/UPPnxYb7Uaa3sqaZr+ckTTRa70fgRovGFUYjKycaJK+Vi9/pOmabEkmYDgD6mkhUmJ58DKjTiTkcd8YwLO3O32o/dur3/w4beaj+rvNN5pPF5ZXl5ZWFl+vXb7frPVWOj+HdW7fL7BAqdq56E/7kgAAAAAAAAAAACAozqP/6gw7n0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALrbV+Sg/iSQWF24tZPOdrVorm3r1nTXLEVGKiOTnEcmnEXeiO8XswHDJqO183Fx5+7PPO093xir31i8d1G+o8t4Fm8UUcxExVZQnsGu8uyceL+nvYZawm73Ewbj9LwAA//+BtRBv") 01:50:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0x0, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1614.689039][ T7003] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x5) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:05 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x4c37e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000880)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/11, 0xb}, {&(0x7f00000002c0)=""/81, 0x51}, {&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000440)=""/164, 0xa4}, {&(0x7f0000000500)=""/140, 0x8c}], 0x5, 0xa71, 0x8) r1 = fsopen(&(0x7f0000000280)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x1f) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000440)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140b}}]}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000080), 0x8) recvfrom(0xffffffffffffffff, &(0x7f0000000640)=""/160, 0xa0, 0x10000, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) sendfile(r0, r0, 0x0, 0x8802000) openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x0, 0x0) 01:50:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) 01:50:05 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a", 0xf8, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1614.894598][ T7029] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1614.930879][ T7031] loop2: detected capacity change from 0 to 1024 01:50:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x5) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1614.975447][ T7031] hfsplus: request for non-existent node -1 in B*Tree [ 1615.010052][ T7031] hfsplus: request for non-existent node -1 in B*Tree 01:50:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1615.027131][ T28] audit: type=1800 audit(1708307405.379:765): pid=7036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=1960 res=0 errno=0 [ 1615.029618][ T7031] hfsplus: failed to load root directory 01:50:05 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x30, r0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x1, 0x62}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 01:50:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1615.122811][ T28] audit: type=1804 audit(1708307405.429:766): pid=7037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1978334634/syzkaller.87hRmT/1862/bus" dev="sda1" ino=1960 res=1 errno=0 01:50:05 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000340), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002100)={0x80000000, &(0x7f0000002040), &(0x7f0000002080)}) [ 1615.215589][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1615.246876][ T7047] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:05 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f00000004c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x2c}}, 0x0) [ 1615.314710][ T7045] loop5: detected capacity change from 0 to 1024 01:50:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:05 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000340), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002100)={0x80000000, &(0x7f0000002040), 0x0}) [ 1615.460829][ T7052] loop2: detected capacity change from 0 to 1024 01:50:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:05 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001b40), 0x0) [ 1615.544946][ T7045] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1615.560200][ T7062] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:05 executing program 4: bpf$BPF_PROG_ATTACH(0x9, &(0x7f00000001c0)={@cgroup, 0xffffffffffffffff, 0x2e, 0x2, 0xffffffffffffffff, @link_id}, 0x20) 01:50:06 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:06 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a", 0xf8, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:06 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x20, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_HE_BSS_COLOR={0xc, 0x11b, 0x0, 0x1, [@NL80211_HE_BSS_COLOR_ATTR_COLOR={0x5, 0x1, 0x1d}]}]}, 0x20}}, 0x0) 01:50:06 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x5) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r0, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:50:06 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) write$cgroup_int(r1, &(0x7f0000000200), 0x3fe00) [ 1615.799680][ T7071] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1615.849029][ T7072] loop2: detected capacity change from 0 to 1024 01:50:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(0xffffffffffffffff, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:06 executing program 1: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x12, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) [ 1615.961153][ T7078] loop5: detected capacity change from 0 to 1024 01:50:06 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x5) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r0, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:50:06 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1616.018608][ T7080] loop4: detected capacity change from 0 to 1024 [ 1616.053863][ T7083] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:06 executing program 1: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x1c, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(0xffffffffffffffff, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1616.152738][ T7078] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:06 executing program 4: bpf$BPF_PROG_ATTACH(0x6, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:06 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x5) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r0, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1616.292583][ T7090] loop2: detected capacity change from 0 to 1024 [ 1616.313528][ T7093] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:06 executing program 1: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getrusage(0x0, &(0x7f0000002400)) 01:50:06 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfa, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(0xffffffffffffffff, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:06 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:06 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x30, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x6}, @val={0xc}}}}, 0x30}}, 0x0) 01:50:06 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:07 executing program 1: r0 = socket(0xa, 0x3, 0x3) bind$can_j1939(r0, 0x0, 0x0) [ 1616.582500][ T7102] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x0, 0x0, 0x2}, 0x48) 01:50:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1616.743640][ T7110] loop5: detected capacity change from 0 to 1024 [ 1616.758678][ T7111] loop2: detected capacity change from 0 to 1024 01:50:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:07 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={@cgroup, 0xffffffffffffffff, 0x2e, 0x2, 0xffffffffffffffff, @link_id}, 0x20) [ 1616.859917][ T7120] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1616.889317][ T7110] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:07 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1616.940556][ T7123] input: syz1 as /devices/virtual/input/input10 01:50:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:07 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000001280)={0x6, @remote, 0x0, 0x200000001, 'ovf\x00'}, 0x2c) 01:50:07 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc8", 0xfa, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1617.128175][ T7127] loop2: detected capacity change from 0 to 1024 [ 1617.132317][ T7131] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:07 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000067000000080001006200000008000300", @ANYRES32, @ANYBLOB="0c0006"], 0x40}}, 0x0) 01:50:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1617.219706][ T7137] input: syz1 as /devices/virtual/input/input11 01:50:07 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1617.352037][ T5315] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1617.419821][ T7141] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1617.448841][ T7142] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1617.457707][ T7141] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 01:50:07 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:07 executing program 4: r0 = socket(0x2, 0x2, 0x0) bind$can_j1939(r0, 0x0, 0x0) [ 1617.538609][ T7144] loop5: detected capacity change from 0 to 1024 [ 1617.623047][ T7146] loop2: detected capacity change from 0 to 1024 [ 1617.677663][ T7148] input: syz1 as /devices/virtual/input/input12 [ 1617.734565][ T7153] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1617.744863][ T7144] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1617.765726][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x0) 01:50:08 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:08 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc8", 0xfa, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1618.013009][ T7162] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1618.094953][ T7167] input: syz1 as /devices/virtual/input/input13 [ 1618.106415][ T7164] loop2: detected capacity change from 0 to 1024 01:50:08 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xa3cc, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 01:50:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xc9}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:08 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1618.201798][ T6863] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:08 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1618.397475][ T7171] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1618.523151][ T7174] loop2: detected capacity change from 0 to 1024 01:50:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x559e) mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) shmget(0x1, 0x3000, 0x4, &(0x7f00001c9000/0x3000)=nil) 01:50:08 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{0x0}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1618.590242][ T7178] loop5: detected capacity change from 0 to 1024 [ 1618.643794][ T7180] input: syz1 as /devices/virtual/input/input14 01:50:09 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGKqW+TT1W4RyWyUyhExExGVbMFmxD969QthZvjiJ+cdBwAAAIzBc9uxHRtxpTefJtl7/ngpf/8/E+/H42hHM9rRikbc634YkL/rL3W2aq3OVu1RNu0f97v/OlYY+YjR/exh+Jav52tU43408yW34m68G624F6W8Z+Z6L57hcf0qiyl5o3DEyO4VZbbnfyjKMzL4YUr18NVn84xc6mdkoYgty8bzB2fimEdn75YWo9QP9uqeLQ3uROnAnE+N3N7losz253dnm/Nj2puJpYGz76WDcx7x9b/86ccPWo8fPri/Pj85u3Q0vYOV9hbszUQtPvrJ0+nuWfzyFzkT+yzkmbjWn1+NH8SPYj7m4q1Yi2b8LOrRjkbMxffzWr04n5OBS35Epu7smnvrsEgqxXHpHqyjxFQuVq7Hq3nfK9GMH8a7cS8a8Xr+bykW49uxHMuxMnCuX+ts1cqDse8OJL/qSyPutOlXhgZ/8xtFJbv1/X7/LfC/h+392cny+vxAXgfvubN52+CSnSy9cPrPo/LXikp2avy6uNtPhr2ZWBzIxIsHZ+KP+W1lvfX44dqD+ntH3N5rRZldR789+lNi9GPn1GTnywvZwcrndp8dWduLQ9sW87ar/bbSvrZr/bbulbo58kqtFK/h9o+0lLe9PLStlrddH2gb9noLgIl3+ZuXK9V/Vv9e/aT6m+qD6psz35v+zvQrlbj010tRXph6rfRK8uf4JH6x8/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4dusffPiw3mo11vZU0jT95Yimi1zp/QjQeMOoxGRk40SV8rF6/SdN02JJMgHBH1JJC5MSz4GVG3EmI4/5xgScudvtR+/dXv/gw281H9XfabzTeLyyvLyysLL8eu32/WarsdD9O6p3+XyDBU7VzkN/3JEAAAAAAAAAAAAAR3Ue/1Fh3PsIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXGyr81F+EkksLtxayOY7W7VWNvXqO2uWI6IUEcnPI5JPI+5Ed4rZgeGSUdv5uLny9mefd57ujFXurV86qN9Q5b0LNosp5iJiqihPYNd4d088XtLfwyxhN3uJg3H7XwAAAP//if4MdA==") 01:50:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1618.816524][ T7187] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1618.894370][ T7178] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{0x0}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1619.020902][ T7193] input: syz1 as /devices/virtual/input/input15 [ 1619.026995][ T7192] loop2: detected capacity change from 0 to 1024 01:50:09 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, 0x0, &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1619.174383][ T7197] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:09 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{0x0}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1619.422689][ T7202] loop2: detected capacity change from 0 to 1024 01:50:09 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1619.502574][ T7205] input: syz1 as /devices/virtual/input/input16 [ 1619.519782][ T7207] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1619.529387][ T6863] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void, @void}}}, 0x14}}, 0x0) 01:50:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{0x0}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1619.731921][ T7212] loop5: detected capacity change from 0 to 1024 01:50:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1619.789852][ T7213] loop2: detected capacity change from 0 to 1024 [ 1619.841223][ T7215] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1619.862870][ T7217] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 01:50:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{0x0}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1619.917598][ T7217] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1619.947038][ T7212] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1619.999104][ T7222] input: syz1 as /devices/virtual/input/input17 [ 1620.048795][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:10 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:10 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, 0x0, &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1620.202655][ T7227] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{0x0}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1620.391197][ T7233] input: syz1 as /devices/virtual/input/input18 [ 1620.394613][ T7229] loop2: detected capacity change from 0 to 1024 01:50:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1620.514101][ T7236] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:10 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1620.591910][ T7237] loop5: detected capacity change from 0 to 1024 [ 1620.631003][ T7242] input: syz1 as /devices/virtual/input/input19 01:50:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:11 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x1c, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1620.712472][ T7237] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1620.815476][ T7245] loop2: detected capacity change from 0 to 1024 01:50:11 executing program 4: r0 = socket(0x2a, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0, 0x2000000}}, 0x0) 01:50:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:11 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, 0x0, &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1620.913749][ T7253] input: syz1 as /devices/virtual/input/input20 01:50:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:11 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x3d}, {}]}) 01:50:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1621.240675][ T7263] loop5: detected capacity change from 0 to 1024 01:50:11 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1621.282388][ T7267] input: syz1 as /devices/virtual/input/input21 [ 1621.290842][ T7266] loop2: detected capacity change from 0 to 1024 01:50:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1621.399172][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:11 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1621.502109][ T7263] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:11 executing program 4: r0 = socket(0x18, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 01:50:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1621.625173][ T7283] input: syz1 as /devices/virtual/input/input22 [ 1621.679212][ T7284] loop2: detected capacity change from 0 to 1024 01:50:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:12 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), 0x0, &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:12 executing program 4: r0 = socket(0x18, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 01:50:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:12 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:12 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc0405519, 0x0) 01:50:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1622.033920][ T7296] loop2: detected capacity change from 0 to 1024 01:50:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1622.114682][ T7302] loop5: detected capacity change from 0 to 1024 01:50:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:12 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x7fffdf004000, 0x0, 0x12, r0, 0x0) clock_getres(0x0, &(0x7f0000000380)) 01:50:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:12 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1622.293083][ T7302] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:12 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) 01:50:12 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 01:50:12 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), 0x0, &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:12 executing program 4: r0 = socket(0x1, 0x1, 0x0) recvmsg$can_raw(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 01:50:12 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1622.543879][ T7323] loop2: detected capacity change from 0 to 1024 01:50:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:13 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 01:50:13 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 01:50:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:13 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1622.863680][ T7337] loop5: detected capacity change from 0 to 1024 01:50:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:13 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000700)={&(0x7f0000000340), 0x2000034c, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, 0x1406, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}}, 0x0) 01:50:13 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1622.983753][ T7347] loop2: detected capacity change from 0 to 1024 01:50:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1623.076989][ T7337] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:13 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9otfvO/PO+84zz86Hd61oA/i/tTof5SeRxOr8mxvZcmer1ups1R712hExHRGliHK3iuTfaZp+GnEnuiW+mq0spktG7efj5srbn33eedpdKhcl37500Lij2SxKzEXEVFH3lU42392ifuOZw0v6R5gl7GYvcTBul7IrMe2ZS9P0p3/7cr9nQHXY6JlziRE4W0n3ubnPbMTl4kLPfg/oPhWf5ZE6YTbHHQAAAACcg+e2Yzs24sq44wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAICLpPj+/6QopV57LpLe9/9XinVRtCfLjeNt/uSs4gAAAAAAAACAc3RjO7ZjI670ltMk/5v/q/nC1fznl+L9WI9GrMWt2Ih6tKMda7EYEbMDE1U26u322mJ/5MyQkVP5yKWhI5cOCXS6qKundeQAAAAAAAAA8IXyUazu/P0fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmQRIx1a3ycrUoyWyUyhExExGVbLvNiH/02hfCzPDVT847DgAAABiD57ZjOzbiSm85TfL3+y/l7/9n4v14HO1oRjta0Yh7+WcC3Xf9pc5WrdXZqj3Kyv55v/uvY4WRzxjdzx6G7/l6vkU17kczX3Mr7sa70Yp7UcpHZq734hke16+ymJI3CkeM7F5RZ0f+h6I+I4MfplQP33w2z8ilfkYWitiybDx/cCaO+ers3dNilPrBXt2zp8GDKB2Y86mR+7tc1Nnx/O5sc35MezOxNHD2vXRwziO+/pc//fhB6/HDB/fX5yfnkI6m92KlvRV7M1GLj37ydLp7Fr/8Rc7EPgt5Jq71l1fjB/GjmI+5eCvWohk/i3q0oxFz8f28VS/O52Tgkh+RqTu7lt46LJJK8bp0X6yjxFQuNq7Hq/nYK9GMH8a7cS8a8Xr+bykW49uxHMuxMnCuX+ts1cqDse8OJL/qSyPutOlXhgZ/8xtFI7v1/X7/LfC/hx392cny+vxAXgfvubN53+CanSy9cPrPo/LXikZ2avy6uNtPhr2ZWBzIxIsHZ+KP+W1lvfX44dqD+ntH3N9rRZ1dR789+lNi9GPn1GTnywvZi5Uv7T47sr4Xh/Yt5n1X+32lfX3X+n3dK3Vz5JVaKX6H2z/TUt738tC+Wt53faBv2O9bAEy8y9+8XKn+s/r36ifV31QfVN+c+d70d6ZfqcSlv16K8sLUa6VXkj/HJ/GLnff/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAs1v/4MOH9VarsbankabpL0d0XeRG70uAxhtGJSYjGydqlI816j9pmhZrkgkI/pBGWpiUeA5s3IgzmXnMNybgzN1uP3rv9voHH36r+aj+TuOdxuOV5eWVhZXl12u37zdbjYXuz1Gjy+cbLHCqdh76444EAAAAAAAAAAAAOKrz+I8K4z5GAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4GJbnY/yk0hiceHWQrbc2aq1stJr72xZjohSRCQ/j0g+jbgT3RKzA9Mlo/bzcXPl7c8+7zzdmavc27500LihyntXbBYl5iJiqqhPYNd8d088X9I/wixhN3uJg3H7XwAAAP//KzEMhw==") 01:50:13 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x29, 0x33, 0x0, 0x0) 01:50:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x0, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:13 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), 0x0, &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01"], 0x14}}, 0x0) [ 1623.339831][ T7362] loop2: detected capacity change from 0 to 1024 01:50:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x0, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:13 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGKqW+TT1Yi4ntVno1SOiJmIqGTrbUb8o1e/EGaGL35y3nEAAADAGDy3HduxEVd682mSv+d/KX//PxPvx+NoRzPa0YpG3Ms/E+i+6y91tmqtzlbtUTbtH/e7/zpWGPmI0f3sYfiWr+drVON+NPMlt+JuvButuBelvGfmei+e4XH9KospeaNwxMjuFWW2538oyjMy+GFK9fDVZ/OMXOpnZKGILcvG8wdn4phHZ++WFqPUD/bqni0N7kTpwJxPjdze5aLM9ud3Z5vzY9qbiaWBs++lg3Me8fW//OnHD1qPHz64vz4/Obt0NL2DlfYW7M1ELT76ydPp7ln88hc5E/ss5Jm41p9fjR/Ej2I+5uKtWItm/Czq0Y5GzMX381q9OJ+TgUt+RKbu7Jp767BIKsVx6R6so8RULlaux6t53yvRjB/Gu3EvGvF6/m8pFuPbsRzLsTJwrl/rbNXKg7HvDiS/6ksj7rTpV4YGf/MbRSW79f1+/y3wv4ft/dnJ8vr8QF4H77mzedvgkp0svXD6z6Py14pKdmr8urjbT4a9mVgcyMSLB2fij/ltZb31+OHag/p7R9zea0WZXUe/PfpTYvRj59Rk58sL2cHK53afHVnbi0PbFvO2q/220r62a/227pW6OfJKrRSv4faPtJS3vTy0rZa3XR9oG/Z6C4CJd/mblyvVf1b/Xv2k+pvqg+qbM9+b/s70K5W49NdLUV6Yeq30SvLn+CR+sfP+HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeHbrH3z4sN5qNdb2VNI0/eWIpotc6f0I0HjDqMRkZONElfKxev0nTdNiSTIBwR9SSQuTEs+BlRtxJiOP+cYEnLnb7Ufv3V7/4MNvNR/V32m803i8sry8srCy/Hrt9v1mq7HQ/Tuqd/l8gwVO1c5Df9yRAAAAAAAAAAAAAEd1Hv9RYdz7CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFxsq/NRfhJJLC7cWsjmO1u1Vjb16jtrliOiFBHJzyOSTyPuRHeK2YHhklHb+bi58vZnn3ee7oxV7q1fOqjfUOW9CzaLKeYiYqooT2DXeHdPPF7S38MsYTd7iYNx+18AAAD///w8DIs=") 01:50:13 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x7}}) 01:50:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x0, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1623.643347][ T7373] loop5: detected capacity change from 0 to 1024 01:50:14 executing program 4: socket(0xa, 0x0, 0xb33) [ 1623.713707][ T7381] loop2: detected capacity change from 0 to 1024 [ 1623.774609][ T7373] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:14 executing program 4: sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1409, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x38}}, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000000a1401"], 0x38}}, 0x0) 01:50:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:14 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc0405519, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}) 01:50:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:14 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0Dqtk4bUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6Y+/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1thDlx5HE2sKbm9l8Z7vW6mzXHvbqETEdEaWIcreI5N9pmn4acTu6U3w1W1gMl4zazsfN1bc/+7zzpDtXLqZ8/dJB/Y5mq5hiPiKmirKvdLLx7hTlG88cXtLfwyxhN3qJg3G7lF2Jac98mqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rp3AAAAAHAOntuJndiMK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9erzkfR+/79SLIuiPlmuH2/1x2cVBwAAAAAAAACco+s7sRObcaU3nyb5d/6v5jNz+d8vxfuxEY1Yj5uxGfVoRzvWYykiZgcGqmzW2+31pX7PmSE9p/Key0N7Lh8S6HRRVk9rzwEAAAAAAADgC+WjWNv9/h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACZBEjHVLfJpLk3T61l9NkrliJiJiEq23lbEP3r1C2Fm+OLH5x0HAAAAjMFzO7ETm3GlN58mMRcRL+Xv/2fi/XgU7WhGO1rRiLv5ZwLdd/2lznat1dmuPcym/eN+91/HCiMfMbqfPQzf8rV8jWrci2a+5GbciXejFXejlPfMXOvFMzyuX2UxJW8UjhjZ3aLM9vwPRXlGBj9MqR6++myekUv9jCwWsWXZeP7gTBzz6Ozd0lKU+sHO7dnS4E6UDsz51MjtXS7KbH9+d7Y5P6a9mVgeOPteOjjnEV//y59+fL/16MH9exsLk7NLR9M7WGlvwd5M1OKjnzyZ7p7FL3+RM7HPYp6Jq/35tfhB/CgWYj7eivVoxs+iHu1oxHx8P6/Vi/M5GbjkR2Tq9lNzbx0WSaU4Lt2DdZSYysXK9Xg173slmvHDeDfuRiNez/8tx1J8O1ZiJVYHzvWrne1aeTD2pwPJr/rSiDtt+pWhwd/4RlHJbn2/338L/O9he392srw+P5DXwXvubN42uGQ3Sy+c/vOo/LWikp0avy7u9pNhbyaWBjLx4sGZ+GN+W9loPXqwfr/+3hG391pRZtfRb4/+lBj92Dk12fnyQnaw8rmnz46s7cWhbUt521y/rbSv7Wq/rXulbo28UivFa7j9Iy3nbS8PbavlbdcG2oa93gJg4l3+5uVK9Z/Vv1c/qf6mer/65sz3pr8z/UolLv31UpQXp14rvZL8OT6JX+y+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJ7dxgcfPqi3Wo31PZU0TX85oukiV3o/AjTeMCoxGdk4UaV8rF7/SdO0WJJMQPCHVNLCpMRzYOV6nMnIY74xAWfuVvvhe7c2PvjwW82H9Xca7zQera6srC6urrxeu3Wv2Wosdv+O6l0+32CBU7X70B93JAAAAAAAAAAAAMBRncd/VBj3PgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX29pClB9HEkuLNxez+c52rZVNvfrumuWIKEVE8vOI5NOI29GdYnZguGTUdj5urr792eedJ7tjlXvrlw7qN1R574KtYor5iJgqyhN4arw7Jx4v6e9hlrAbvcTBuP0vAAD//6TDD48=") 01:50:14 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), 0x0) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000440)) 01:50:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 1624.120062][ T7403] loop2: detected capacity change from 0 to 1024 01:50:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1624.248640][ T7408] loop5: detected capacity change from 0 to 1024 01:50:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@nobh}, {@noauto_da_alloc}, {@dioread_lock}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@oldalloc}, {@grpid}]}, 0xfc, 0x54c, &(0x7f0000000b40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x103042, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0x49, 0x29, 0x0, {0x0, [{{}, 0x0, 0x0, 0x7, './file1'}, {{}, 0x0, 0x0, 0x7, './file1'}]}}, 0x49) 01:50:14 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1624.468863][ T7418] loop4: detected capacity change from 0 to 1024 [ 1624.488753][ T7418] EXT4-fs: Ignoring removed nobh option [ 1624.503524][ T7418] EXT4-fs: Ignoring removed oldalloc option [ 1624.514102][ T7408] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:14 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1624.585575][ T7423] loop2: detected capacity change from 0 to 1024 [ 1624.610202][ T7418] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 01:50:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:15 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), &(0x7f0000000640), 0x0) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd341000008801000000"}, 0x28) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:50:15 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x38}}, 0x0) 01:50:15 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1624.898934][ T5105] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1624.940462][ T7442] loop5: detected capacity change from 0 to 1024 01:50:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:50:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd341000008801000000"}, 0x28) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1625.056572][ T7448] loop2: detected capacity change from 0 to 1024 [ 1625.084208][ T7442] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:15 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), 0x0) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd341000008801000000"}, 0x28) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:15 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:50:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x13, 0x8, 0xfffffffb}, 0x48) 01:50:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a00"}, 0x34) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:50:15 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000080)={0x20, 0x1406, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x7}, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000000)={&(0x7f0000000340), 0xc, &(0x7f0000000040)={&(0x7f0000000680)={0x10, 0x1406, 0x0, 0x0, 0xfffffffe}, 0x10}, 0x7}, 0x0) [ 1625.494506][ T7463] loop2: detected capacity change from 0 to 1024 [ 1625.509492][ T7467] loop5: detected capacity change from 0 to 1024 01:50:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a00"}, 0x34) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:16 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1625.639522][ T7467] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7dc3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x4030582a, 0x0) 01:50:16 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x4020940d, &(0x7f00000000c0)={0x0}) 01:50:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a00"}, 0x34) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:16 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:16 executing program 3: mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000040), 0x0, 0x0) 01:50:16 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$dsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 01:50:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda"}, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1625.966507][ T7484] loop2: detected capacity change from 0 to 1024 [ 1625.969055][ T7492] input: syz1 as /devices/virtual/input/input34 01:50:16 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x9, 0x0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000080)=['!+\x00'], 0x3}) 01:50:16 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x7dc3, 0x107140) [ 1626.127506][ T7499] loop5: detected capacity change from 0 to 1024 01:50:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda"}, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:16 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:16 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0}) 01:50:16 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000f80), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000fc0)={&(0x7f0000ffa000/0x3000)=nil}) [ 1626.314381][ T7499] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1626.333898][ T7506] input: syz1 as /devices/virtual/input/input35 [ 1626.405150][ T7509] loop2: detected capacity change from 0 to 1024 01:50:16 executing program 3: socket(0xa, 0x5, 0x0) 01:50:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:16 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x5b, 0xe1, 0x58, 0x40, 0x421, 0x42d, 0xafca, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x5, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 01:50:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda"}, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:16 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:16 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x801c581f, 0x0) [ 1626.681674][ T7521] input: syz1 as /devices/virtual/input/input36 01:50:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a8722"}, 0x3d) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:17 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x4043) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, 0x0) 01:50:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1626.753395][ T7527] loop2: detected capacity change from 0 to 1024 01:50:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a8722"}, 0x3d) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040), 0xcef, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0}) [ 1626.869392][ T7531] loop5: detected capacity change from 0 to 1024 01:50:17 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1626.955360][ T7536] input: syz1 as /devices/virtual/input/input37 01:50:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a8722"}, 0x3d) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1627.045876][ T7531] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:17 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000100)) [ 1627.118151][ T7543] loop2: detected capacity change from 0 to 1024 01:50:17 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7"}, 0x3f) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:17 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1627.251143][ T7547] input: syz1 as /devices/virtual/input/input38 01:50:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7dc3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x541b, 0x0) 01:50:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7"}, 0x3f) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:17 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000440)={&(0x7f0000000300), 0x10, &(0x7f0000000400)={0x0}}, 0x0) [ 1627.475028][ T7555] loop5: detected capacity change from 0 to 1024 [ 1627.484425][ T7560] input: syz1 as /devices/virtual/input/input39 01:50:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1627.520468][ T7558] loop2: detected capacity change from 0 to 1024 [ 1627.604453][ T7555] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7"}, 0x3f) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1627.659589][ T7567] input: syz1 as /devices/virtual/input/input40 01:50:18 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:18 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:18 executing program 3: setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000040), 0x4) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) [ 1627.902678][ T7574] input: syz1 as /devices/virtual/input/input41 01:50:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1627.947449][ T7575] loop2: detected capacity change from 0 to 1024 [ 1627.986838][ T7578] loop5: detected capacity change from 0 to 1024 01:50:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x2, 0x0) 01:50:18 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1628.111900][ T7580] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1628.148655][ T7578] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7dc3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x5460, 0x0) [ 1628.184699][ T7582] input: syz1 as /devices/virtual/input/input42 [ 1628.311292][ T7587] loop2: detected capacity change from 0 to 1024 01:50:20 executing program 4: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000080), 0x705900, 0x0) 01:50:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:20 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:20 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x501, 0x0) 01:50:20 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1629.778930][ T7593] loop5: detected capacity change from 0 to 1024 [ 1629.788662][ T7597] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1629.793658][ T7598] input: syz1 as /devices/virtual/input/input43 [ 1629.800839][ T7594] loop2: detected capacity change from 0 to 1024 01:50:20 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 01:50:20 executing program 3: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xecc3e08f150c0d72, 0xffffffffffffffff, 0x0) 01:50:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:20 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRKg2a2dn1xt71R/yx6/T3i8bvO/PO+84zz3zth6IN4EtrdT7KjyKJ1fk3N7L5zlat1dmqPejVI2I6IkoR5W4RyX/TNP004lZ0p/h6trAYLhm1nY+bK29/9nnncXeuXEz5+qX9+h3OZjHFXERMFWVf6Xjj3S7KN546vKS/h1nCrvcSB+N2IbsS0565NE1//o+v9lsGVIf1njmTGIHTlXSfm3vMRlwsLvTsdUD3qfg0j9QJsznuAAAAAOAMPLcd27ERl8YdBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJwnxe//J8VU6tXnIun9/n+lWBZFfbJcO9rqj04rDgAAAAAAAAA4Q9e2Yzs24lJvPk3y7/xfzWcu53+/Eu/HejRiLW7ERtSjHe1Yi8WImB0YqLJRb7fXFvs9Z4b0nMp7Lg3tuXRAoNNFWT2pPQcAAAAAAACAZ8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGKqW+TT5W75RcxGqRwRMxFRydbbjPhXr34uzAxf/Ois4wAAAIAxeG47tmMjLvXm0yR/z/9S/r5/Jt6Ph9GOZrSjFY24k38m0H3XX+ps1VqdrdqDbNo77vf/c6Qw8hGj+9nD8C1fzdeoxt1o5ktuxO14N1pxJ0p5z8zVXjzD4/pNFlPyRuGQkd0pymzP/1SUp2Tww5TqwavP5hm50M/IQhFblo3n98/EEY/O7i0tRqkf7OVdWxrcidK+OZ8aub2LRZntzx9ON+dHtDsTSwNn30v75zzim3/7y0/vtR7ev3d3fX5ydulwegcr7S3YnYlafPSzx9Pds/jlZzkTeyzkmbjSn1+NH8VPYj7m4q1Yi2b8IurRjkbMxQ/zWr04n5OBS35Epm49MffWQZFUiuPSPViHialcrFyPV/O+l6IZP45340404vX831IsxndjOZZjZeBcv9LZqpUHY38ykPyqL42406ZfGxr89W8VlezW98e9t8AvDtr705Pl9fmBvA7ec2fztsElO1l64eSfR+VvFJXs1PhtcbefDLszsTiQiRf3z8Sf89vKeuvh/bV79fcOub3XijK7jn5/+KfE6MfOicnOlxeyg5XPPXl2ZG0vDm1bzNsu99tKe9qu9Nu6V+rmyCu1UryG2zvSUt728tC2Wt52daBt2OstACbexW9frFT/Xf1n9ZPq76r3qm/O/GD6e9OvVOLC3y9EeWHqtdIryV/jk/jVzvt/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg6a1/8OH9eqvVWNtVSdP01yOaznOl9yNA4w2jEpORjWNVykfq9b80TYslyQQEf0AlLUxKPPtWrsWpjDzmGxNw6m62H7x3c/2DD7/TfFB/p/FO4+HK8vLKwsry67Wbd5utxkL376je5bMNFjhROw/9cUcCAAAAAAAAAAAAHNZZ/EeFce8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcL6tzkf5USSxuHBjIZvvbNVa2dSr76xZjohSRCS/jEg+jbgV3SlmB4ZLRm3n4+bK25993nm8M1a5t35pv35DlXcv2CymmIuIqaI8hifGu33s8ZL+HmYJu95LHIzb/wMAAP//h4ANbw==") [ 1629.988564][ T7593] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:20 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0x1}, 0x1c) 01:50:20 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xc30a6787d0ea767c, 0xffffffffffffffff, 0x8000000) [ 1630.178370][ T7612] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1630.188876][ T7610] loop2: detected capacity change from 0 to 1024 [ 1630.199173][ T7613] input: syz1 as /devices/virtual/input/input44 01:50:20 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1630.294388][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:20 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, '\x00', '\x00', '\x00', 0x0, 0x0, 0x0, 0x0, "5a41e89a65cebcc9337a8efed37d4d7f"}) 01:50:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:20 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1630.472249][ T7622] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1630.472855][ T7621] input: syz1 as /devices/virtual/input/input45 01:50:20 executing program 3: r0 = io_uring_setup(0xd4, &(0x7f0000000000)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x8000000) syz_io_uring_setup(0x19ae, 0x0, 0x0, 0x0) 01:50:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1630.585372][ T7625] loop2: detected capacity change from 0 to 1024 [ 1630.637726][ T7627] loop5: detected capacity change from 0 to 1024 01:50:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:21 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:21 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={0x0, 0x0, 0x25365231051ffc4}, 0x18) [ 1630.730827][ T7631] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1630.914570][ T7627] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1630.923596][ T7633] input: syz1 as /devices/virtual/input/input46 [ 1630.975810][ T7637] loop2: detected capacity change from 0 to 1024 01:50:21 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) recvmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/147, 0x93}], 0x1}, 0x0) 01:50:21 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="30000000071420002dbd7000fcdbdf250900020073797a310000000008004400", @ANYRES32=r1, @ANYBLOB="00020073797a320000000000758da8f349804b5873b8b693809e06328c5758b6b000f46b9ea8ac47046a31121b4ae957b9d449f7fc72d166e558f7cb6acaa95130ae6d77d75a355ea253d43fad785f4dd7a7c7d9bfdbe540ee"], 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x91) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = socket(0x1, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x9, 0x5, 0x18, @local, @remote, 0x20, 0x98, 0xffff7fff, 0x4}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', r4, r5, 0x2, 0x3, 0x2}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000480)={'ip6gre0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty, 0x1}}) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r3, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x28, 0x1406, 0x400, 0x70bd2b, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x801}, 0x20000000) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x18480, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r6, 0xc0045520, &(0x7f0000000300)=0x80000000) r7 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f00000003c0)=""/227, &(0x7f0000000080)=0xe3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r2, 0x33, 0x0, 0x693, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}, 0x40) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000004, 0x1010, r8, 0x0) 01:50:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1631.058003][ T7641] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:21 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:21 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x3d}]}) [ 1631.319566][ T7649] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:21 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000040)=""/219) [ 1631.380008][ T7650] input: syz1 as /devices/virtual/input/input47 [ 1631.414019][ T6863] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1631.457581][ T7651] loop2: detected capacity change from 0 to 1024 01:50:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x40049409, &(0x7f00000000c0)={0x0}) 01:50:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:22 executing program 3: syz_io_uring_setup(0x19c4, &(0x7f0000000100)={0x0, 0x831e, 0xe}, &(0x7f0000000180), &(0x7f00000001c0)) [ 1631.626971][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:22 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1uu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6Y+/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1thDlx5HE2sKbm9l8Z7vW6mzXHvbqETETEaWIcreI5N9pmn4acTu6U3w1W1gMl4zazsfN1bc/+7zzpDtXLqZ8/dJB/Y5mq5hiPiKmirKvdLLx7hTlG88cXtLfwyxhN3qJg3Gbzq7EtGc+TdOf/u3L/ZYB1WG9Z88lRuBsJd3n5j5zEZeKCz17HdB9Kj7LI3XCbI07AAAAADgHz+3ETmzG5XHHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABdJ8fv/STGVevX5SHq//18plkVRnyzXj7f647OKAwAAAAAAAADO0fWd2InNuNybT5P8O/9X85kr+d8vxfuxEY1Yj5uxGfVoRzvWYyki5gYGqmzW2+31pX7P2SE9p/Key0N7Lh8S6ExRVk9rzwEAAAAAAADgC+WjWNv9/h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACZBEjHVLfLpSlFOz0WpHBGzEVHJ1tuK+EevfiHMDl/8+LzjAAAAgDF4bid2YjMu9+bTJH/P/1L+vn823o9H0Y5mtKMVjbibfxbQfddf6mzXWp3t2sNs2j/ud/91rDDyEaP72cPwLV/L16jGvWjmS27GnXg3WnE3SnnPzLVePMPj+lUWU/JG4YiR3S3KbM//UJRnZPDDlOrhq8/lGZnuZ2SxiC3LxvMHZ+KYR2fvlpai1A/2yp4tDe5E6cCcT43c3qWizPbnd2eb82Pam4nlgbPvpYNzHvH1v/zpx/dbjx7cv7exMDm7dDS9g5X2FuzNRC0++smTme5Z/PIXORP7LOaZuNqfX4sfxI9iIebjrViPZvws6tGORszH9/NavTifk4FLfkSmbj8199ZhkVSK49I9WEeJqVysXI9X876Xoxk/jHfjbjTi9fzfcizFt2MlVmJ14Fy/2tmulQdjfzqQ/KovjbjTpl8ZGvyNbxSV7Nb3+/23wP8etvdnJ8vr8wN5HbznzuVtg0t2s/TC6T+Pyl8rKtmp8evibj8Z9mZiaSATLx6ciT/mt5WN1qMH6/fr7x1xe68VZXYd/fboT4nRj51Tk50vL2QHK597+uzI2l4c2raUt13pt5X2tV3tt3Wv1K2RV2qleA23f6TlvO3loW21vO3aQNuw11sATLxL37xUqf6z+vfqJ9XfVO9X35z93sx3Zl6pxPRfp6O8OPVa6ZXkz/FJ/GL3/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDsNj748EG91Wqs76mkafrLEU0XudL7EaDxhlGJycjGiSrlY/X6T5qmxZJkAoI/pJIWJiWeAyvX40xGHvONCThzt9oP37u18cGH32o+rL/TeKfxaHVlZXVxdeX12q17zVZjsft3VO/y+QYLnKrdh/64IwEAAAAAAAAAAACO6jz+o8K49xEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC42NYWovw4klhavLmYzXe2a61s6tV31yxHRCkikp9HJJ9G3I7uFHMDwyWjtvNxc/Xtzz7vPNkdq9xbv3RQv6HKexdsFVPMR8RUUZ7AU+PdOfF4SX8Ps4Td6CUOxu1/AQAA//9bBwx4") [ 1631.667365][ T7658] loop5: detected capacity change from 0 to 1024 [ 1631.678796][ T7660] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:22 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000014c0), 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 01:50:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 1631.812470][ T7668] input: syz1 as /devices/virtual/input/input48 [ 1631.860291][ T7658] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:22 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000b00)={0x0}) [ 1631.926497][ T7672] loop2: detected capacity change from 0 to 1024 [ 1631.936593][ T7675] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1632.017436][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:22 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:22 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGKqW+TT1aKszEapHBEzWT1bbzPiH736hTAzfPGT844DAAAAxuC57diOjbjSm0+T/D3/S/n7/pl4Px5HO5rRjlY04l7+WUD3XX+ps1VrdbZqj7Jp/7jf/dexwshHjO5nD8O3fD1foxr3o5kvuRV3491oxb0o5T0z13vxDI/rV1lMyRuFI0Z2ryizPf9DUZ6RwQ9TqoevPptn5FI/IwtFbFk2nj84E8c8Onu3tBilfrBX92xpcCdKB+Z8auT2Lhdltj+/O9ucH9PeTCwNnH0vHZzziK//5U8/ftB6/PDB/fX5ydmlo+kdrLS3YG8mavHRT55Od8/il7/ImdhnIc/Etf78avwgfhTzMRdvxVo042dRj3Y0Yi6+n9fqxfmcDFzyIzJ1Z9fcW4dFUimOS/dgHSWmcrFyPV7N+16JZvww3o170YjX839LsRjfjuVYjpWBc/1aZ6tWHox9dyD5VV8acadNvzI0+JvfKCrZre/3+2+B/z1s789OltfnB/I6eM+dzdsGl+xk6YXTfx6Vv1ZUslPj18XdfjLszcTiQCZePDgTf8xvK+utxw/XHtTfO+L2XivK7Dr67dGfEqMfO6cmO19eyA5WPrf77MjaXhzatpi3Xe23lfa1Xeu3da/UzZFXaqV4Dbd/pKW87eWhbbW87fpA27DXWwBMvMvfvFyp/rP69+on1d9UH1TfnPne9HemX6nEpb9eivLC1GulV5I/xyfxi533/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwLNb/+DDh/VWq7G2p5Km6S9HNF3kSu9HgMYbRiUmIxsnqpSP1es/aZoWS5IJCP6QSlqYlHgOrNyIMxl5zDcm4Mzdbj967/b6Bx9+q/mo/k7jncbjleXllYWV5ddrt+83W42F7t9RvcvnGyxwqnYe+uOOBAAAAAAAAAAAADiq8/iPCuPeRwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBiW52P8pNIYnHh1kI239mqtbKpV99ZsxwRpYhIfh6RfBpxJ7pTzA4Ml4zazsfNlbc/+7zzdGescm/90kH9hirvXbBZTDEXEVNFeQK7xrt74vGS/h5mCbvZSxyM2/8CAAD//89CDHk=") 01:50:22 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x12, 0x0, 0x0) [ 1632.233317][ T7685] loop2: detected capacity change from 0 to 1024 [ 1632.245859][ T7687] input: syz1 as /devices/virtual/input/input49 01:50:22 executing program 3: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) [ 1632.323692][ T7689] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:22 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0x5452, 0x0) 01:50:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:22 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x5, 0x0, 0x0) 01:50:22 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:22 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) [ 1632.540403][ T7697] loop5: detected capacity change from 0 to 1024 [ 1632.614188][ T7701] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:23 executing program 4: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6, 0x10, r0, 0x0) [ 1632.703142][ T7706] input: syz1 as /devices/virtual/input/input50 01:50:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:23 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x29, 0x0, 0x0, 0x0) [ 1632.753419][ T7697] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1632.759817][ T7705] loop2: detected capacity change from 0 to 1024 01:50:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:50:23 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu110DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6Y+/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1thDlx5HE2sKbm9l8Z7vW6mzXHvbqETEdEaWIcreI5N9pmn4acTu6U3w1W1gMl4zazsfN1bc/+7zzpDtXLqZ8/dJB/Y5mq5hiPiKmirKvdLLx7hTlG88cXtLfwyxhN3qJg3G7lF2Jac98mqY//duX+y0DqsN6z5xLjMDZSrrPzX3mImaLCz17HdB9Kj7LI3XCbI07AAAAADgHz+3ETmzG5XHHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABdJ8fv/STGVevX5SHq//18plkVRnyzXj7f647OKAwAAAAAAAADO0fWd2InNuNybT5P8O/9X85kr+d8vxfuxEY1Yj5uxGfVoRzvWYyki5gYGqmzW2+31pX7PmSE9p/Key0N7Lh8S6HRRVk9rzwEAAAAAAADgC+WjWNv9/h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACZBEjHVLfLpSlHOzkWpHBEzEVHJ1tuK+EevfiHMDF/8+LzjAAAAgDF4bid2YjMu9+bTJH/P/1L+vn8m3o9H0Y5mtKMVjbibfxbQfddf6mzXWp3t2sNs2j/ud/91rDDyEaP72cPwLV/L16jGvWjmS27GnXg3WnE3SnnPzLVePMPj+lUWU/JG4YiR3S3KbM//UJRnZPDDlOrhq8/lGbnUz8hiEVuWjecPzsQxj87eLS1FqR/slT1bGtyJ0oE5nxq5vdmizPbnd2eb82Pam4nlgbPvpYNzHvH1v/zpx/dbjx7cv7exMDm7dDS9g5X2FuzNRC0++smT6e5Z/PIXORP7LOaZuNqfX4sfxI9iIebjrViPZvws6tGORszH9/NavTifk4FLfkSmbj8199ZhkVSK49I9WEeJqVysXI9X876Xoxk/jHfjbjTi9fzfcizFt2MlVmJ14Fy/2tmulQdjfzqQ/KovjbjTpl8ZGvyNbxSV7Nb3+/23wP8etvdnJ8vr8wN5HbznzuVtg0t2s/TC6T+Pyl8rKtmp8evibj8Z9mZiaSATLx6ciT/mt5WN1qMH6/fr7x1xe68VZXYd/fboT4nRj51Tk50vL2QHK597+uzI2l4c2raUt13pt5X2tV3tt3Wv1K2RV2qleA23f6TlvO3loW21vO3aQNuw11sATLzZb85Wqv+s/r36SfU31fvVN2e+N/2d6Vcqcemvl6K8OPVa6ZXkz/FJ/GL3/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDsNj748EG91Wqs76mkafrLEU0XudL7EaDxhlGJycjGiSrlY/X6T5qmxZJkAoI/pJIWJiWeAyvX40xGHvONCThzt9oP37u18cGH32o+rL/TeKfxaHVlZXVxdeX12q17zVZjsft3VO/y+QYLnKrdh/64IwEAAAAAAAAAAACO6jz+o8K49xEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC42NYWovw4klhavLmYzXe2a61s6tV31yxHRCkikp9HJJ9G3I7uFHMDwyWjtvNxc/Xtzz7vPNkdq9xbv3RQv6HKexdsFVPMR8RUUZ7AU+PdOfF4SX8Ps4Td6CUOxu1/AQAA//+gTAx9") 01:50:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{}, {0x5}]}) 01:50:23 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc0045540, 0x0) [ 1632.997540][ T7715] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:23 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1633.095861][ T7719] input: syz1 as /devices/virtual/input/input51 [ 1633.156919][ T7720] loop2: detected capacity change from 0 to 1024 01:50:23 executing program 4: r0 = socket(0x1, 0x1, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x20008815) 01:50:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 01:50:23 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 01:50:23 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1633.302131][ T7726] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:23 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc03064ca, &(0x7f0000000200)={0x0, 0x0}) 01:50:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 01:50:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @dev}}}) [ 1633.454397][ T7733] loop5: detected capacity change from 0 to 1024 [ 1633.562432][ T7736] loop2: detected capacity change from 0 to 1024 [ 1633.575596][ T7739] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1633.623325][ T7743] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:24 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f00000001c0), 0x4800, 0x0) 01:50:24 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x4e, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3c, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x0, 'K'}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x3}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0xe7}}}}}]}}]}}, 0x0) 01:50:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 01:50:24 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGKqW+TT1aK8PhulckTMREQlW28z4h+9+oUwM3zxk/OOAwAAAMbgue3Yjo240ptPk/w9/0v5+/6ZeD8eRzua0Y5WNOJe/llA911/qbNVa3W2ao+yaf+43/3XscLIR4zuZw/Dt3w9X6Ma96OZL7kVd+PdaMW9KOU9M9d78QyP61dZTMkbhSNGdq8osz3/Q1GekcEPU6qHrz6bZ+RSPyMLRWxZNp4/OBPHPDp7t7QYpX6wV/dsaXAnSgfmfGrk9i4XZbY/vzvbnB/T3kwsDZx9Lx2c84iv/+VPP37Qevzwwf31+cnZpaPpHay0t2BvJmrx0U+eTnfP4pe/yJnYZyHPxLX+/Gr8IH4U8zEXb8VaNONnUY92NGIuvp/X6sX5nAxc8iMydWfX3FuHRVIpjkv3YB0lpnKxcj1ezfteiWb8MN6Ne9GI1/N/S7EY347lWI6VgXP9WmerVh6MfXcg+VVfGnGnTb8yNPib3ygq2a3v9/tvgf89bO/PTpbX5wfyOnjPnc3bBpfsZOmF038elb9WVLJT49fF3X4y7M3E4kAmXjw4E3/MbyvrrccP1x7U3zvi9l4ryuw6+u3RnxKjHzunJjtfXsgOVj63++zI2l4c2raYt13tt5X2tV3rt3Wv1M2RV2qleA23f6SlvO3loW21vO36QNuw11sATLzL37xcqf6z+vfqJ9XfVB9U35z53vR3pl+pxKW/XorywtRrpVeSP8cn8Yud9/8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzW//gw4f1VquxtqeSpukvRzRd5ErvR4DGG0YlJiMbJ6qUj9XrP2maFkuSCQj+kEpamJR4DqzciDMZecw3JuDM3W4/eu/2+gcffqv5qP5O453G45Xl5ZWFleXXa7fvN1uNhe7fUb3L5xsscKp2HvrjjgQAAAAAAAAAAAA4qvP4jwrj3kcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgYludj/KTSGJx4dZCNt/ZqrWyqVffWbMcEaWISH4ekXwacSe6U8wODJeM2s7HzZW3P/u883RnrHJv/dJB/YYq712wWUwxFxFTRXkCu8a7e+Lxkv4eZgm72UscjNv/AgAA///74AyL") 01:50:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000340)={0xd9, ""/217}) 01:50:24 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df344512") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000052c0)={0x0, 0x0, &(0x7f0000005280)={&(0x7f0000005240)={0x14}, 0x14}}, 0x0) [ 1633.862941][ T7754] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1634.033817][ T7756] loop2: detected capacity change from 0 to 1024 01:50:24 executing program 4: socketpair(0x23, 0x0, 0xfffffffa, &(0x7f0000004580)) 01:50:24 executing program 1: syz_open_dev$sg(&(0x7f0000000340), 0x9, 0x0) [ 1634.086745][ T7762] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1634.091789][ T8] usb 4-1: new high-speed USB device number 10 using dummy_hcd 01:50:24 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6be/6I/7Ydfn9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lJ5HE6vybG9l8Z6vW6mzVHvXqETEdEaWIcreI5N9pmn4acSe6U3w1W1gMl4zazsfNlbc/+7zztDtXLqZ8/dJB/Y5ms5hiLiKmirKvdLLx7hblG88cXtLfwyxhN3uJg3G7lF2Jac9cmqY//duX+y0DqsN6z5xLjMDZSrrPzX1mIy4XF3r2OqD7VHyWR+qE2Rx3AAAAAHAOntuO7diIK+OOAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6S4vf/k2Iq9epzkfR+/79SLIuiPlluHG/1J2cVBwAAAAAAAACcoxvbsR0bcaU3nyb5d/6v5jNX879fivdjPRqxFrdiI+rRjnasxWJEzA4MVNmot9tri/2eM0N6TuU9l4b2XDok0OmirJ7WngMAAAAAAADAF8pHsbrz/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyCJGKqW+TT1axM0/TGbJTKETETEZVsvc2If/TqF8LM8MVPzjsOAAAAGIPntmM7NuJKbz5N8vf8L+Xv/2fi/Xgc7WhGO1rRiHv5ZwLdd/2lzlat1dmqPcqm/eN+91/HCiMfMbqfPQzf8vV8jWrcj2a+5FbcjXejFfeilPfMXO/FMzyuX2UxJW8UjhjZvaLM9vwPRXlGBj9MqR6++myekUv9jCwUsWXZeP7gTBzz6Ozd0mKU+sFe3bOlwZ0oHZjzqZHbu1yU2f787mxzfkx7M7E0cPa9dHDOI77+lz/9+EHr8cMH99fnJ2eXjqZ3sNLegr2ZqMVHP3k63T2LX/4iZ2KfhTwT1/rzq/GD+FHMx1y8FWvRjJ9FPdrRiLn4fl6rF+dzMnDJj8jUnV1zbx0WSaU4Lt2DdZSYysXK9Xg173slmvHDeDfuRSNez/8txWJ8O5ZjOVYGzvVrna1aeTD23YHkV31pxJ02/crQ4G9+o6hkt77f778F/vewvT87WV6fH8jr4D13Nm8bXLKTpRdO/3lU/lpRyU6NXxd3+8mwNxOLA5l48eBM/DG/ray3Hj9ce1B/74jbe60os+vot0d/Sox+7Jya7Hx5ITtY+dzusyNre3Fo22LedrXfVtrXdq3f1r1SN0deqZXiNdz+kZbytpeHttXytusDbcNebwEw8S5/83Kl+s/q36ufVH9TfVB9c+Z709+ZfqUSl/56KcoLU6+VXkn+HJ/EL3be/wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM9u/YMPH9Zbrcbankqapr8c0XSRK70fARpvGJWYjGycqFI+Vq//pGlaLEkmIPhDKmlhUuI5sHIjzmTkMd+YgDN3u/3ovdvrH3z4reaj+juNdxqPV5aXVxZWll+v3b7fbDUWun9H9S6fb7DAqdp56I87EgAAAAAAAAAAAOCozuM/Kox7HwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAICLbXU+yk8iicWFWwvZfGer1sqmXn1nzXJElCIi+XlE8mnEnehOMTswXDJqOx83V97+7PPO052xyr31Swf1G6q8d8FmMcVcREwV5QnsGu/uicdL+nuYJexmL3Ewbv8LAAD//5hXD48=") 01:50:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 1634.260368][ T7764] loop5: detected capacity change from 0 to 1024 01:50:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x83100200}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) [ 1634.383157][ T7772] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1634.392004][ T8] usb 4-1: Using ep0 maxpacket: 32 [ 1634.412127][ T7773] loop2: detected capacity change from 0 to 1024 [ 1634.521767][ T8] usb 4-1: config 1 interface 0 altsetting 4 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1634.523778][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 01:50:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1634.591950][ T7764] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1634.604338][ T8] usb 4-1: config 1 interface 0 has no altsetting 0 01:50:25 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:25 executing program 4: syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x84480) [ 1634.728747][ T7782] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x16, &(0x7f00000002c0)={[{@nobarrier}, {@ssd_spread}, {@commit={'commit', 0x3d, 0x6}}, {@commit={'commit', 0x3d, 0x3f}}, {@nodatasum}, {@nodiscard}, {@treelog}, {@compress_algo={'compress', 0x3d, 'lzo'}}]}, 0x9, 0x50ed, &(0x7f000000a2c0)="$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") [ 1634.812006][ T8] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1634.832492][ T8] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1634.850376][ T8] usb 4-1: Product: syz [ 1634.854799][ T8] usb 4-1: Manufacturer: syz 01:50:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1634.859503][ T8] usb 4-1: SerialNumber: syz 01:50:25 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df344512") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1634.892686][ T7785] loop2: detected capacity change from 0 to 1024 [ 1634.937504][ T8] cdc_ether: probe of 4-1:1.0 failed with error -22 01:50:25 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000004580)) [ 1635.000264][ T7791] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:25 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1635.109566][ T5126] usb 4-1: USB disconnect, device number 10 01:50:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1635.166459][ T7797] loop5: detected capacity change from 0 to 1024 [ 1635.256339][ T7800] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1635.270465][ T7795] loop2: detected capacity change from 0 to 1024 [ 1635.322009][ T7797] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:25 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontxQWfGhBCPlSoKgdOHFbJplllkxZ7i9wKgSlfVw79A8rBN05I3COVCxe49brHSEhcesFISINmdna9sXf9EX/sOv39ovH7zrzzvvPMM1/7oWgD+MJanY/yo0hidf7NjWy+s1VrdbZqD3r1iJiOiFJEuVtE8p80TT+NuBXdKb6aLSyGS0Zt5+Pmytuffd553J0rF1O+fmm/foezWUwxFxFTRdlXOt54t4vyjacOL+nvYZaw673EwbhdyK7EtGcuTdOf/f3L/ZYB1WG9Z84kRuB0Jd3n5h6zEReLCz17HdB9Kj7NI3XCbI47AAAAADgDz23HdmzEpXHHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOdJ8fv/STGVevW5SHq//18plkVRnyzXjrb6o9OKAwAAAAAAAADO0LXt2I6NuNSbT5P8O/9X85nL+d8vxfuxHo1YixuxEfVoRzvWYjEiZgcGqmzU2+21xX7PmSE9p/KeS0N7Lh0Q6HRRVk9qzwEAAAAAAADgmfJRrO58/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJMgiZjqFvl0uSi/PRulckTMREQlW28z4p+9+rkwM3zxo7OOAwAAAMbgue3Yjo241JtPk/w9/0v5+/6ZeD8eRjua0Y5WNOJO/llA911/qbNVa3W2ag+yae+43/v3kcLIR4zuZw/Dt3w1X6Mad6OZL7kRt+PdaMWdKOU9M1d78QyP69dZTMkbhUNGdqcosz3/Y1GeksEPU6oHrz6bZ+RCPyMLRWxZNp7fPxNHPDq7t7QYpX6wl3dtaXAnSvvmfGrk9i4WZbY/vz/dnB/R7kwsDZx9L+2f84iv//XPP7nXenj/3t31+cnZpcPpHay0t2B3Jmrx0U8fT3fP4pef5UzssZBn4kp/fjV+GD+O+ZiLt2ItmvHzqEc7GjEXP8hr9eJ8TgYu+RGZuvXE3FsHRVIpjkv3YB0mpnKxcj1ezfteimb8KN6NO9GI1/N/S7EY34nlWI6VgXP9SmerVh6M/clA8qu+NOJOm35laPDXv1FUslvfH/beAv930N6fniyvzw/kdfCeO5u3DS7ZydILJ/88Kn+tqGSnxm+Ku/1k2J2JxYFMvLh/Jv6U31bWWw/vr92rv3fI7b1WlNl19LvDPyVGP3ZOTHa+vJAdrHzuybMja3txaNti3na531ba03al39a9UjdHXqmV4jXc3pGW8raXh7bV8rarA23DXm8BMPEufvNipfqv6j+qn1R/W71XfXPm+9PfnX6lEhf+diHKC1OvlV5J/hKfxC933v8DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABPb/2DD+/XW63G2q5Kmqa/GtF0niu9HwEabxiVmIxsHKtSPlKv/6ZpWixJJiD4AyppYVLi2bdyLU5l5DHfmIBTd7P94L2b6x98+K3mg/o7jXcaD1eWl1cWVpZfr92822w1Frp/R/Uun22wwInaeeiPOxIAAAAAAAAAAADgsM7iPyqMex8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA8211PsqPIonFhRsL2Xxnq9bKpl59Z81yRJQiIvlFRPJpxK3oTjE7MFwyajsfN1fe/uzzzuOdscq99Uv79RuqvHvBZjHFXERMFeUxPDHe7WOPl/T3MEvY9V7iYNz+HwAA//+zFwyn") 01:50:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 01:50:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, 0x0, 0xc010) [ 1635.474412][ T7804] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:26 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df344512") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1635.617912][ T7806] loop2: detected capacity change from 0 to 1024 01:50:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x2}, 0x48) 01:50:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x7, 0x0, 0x0}, 0x90) [ 1635.719015][ T7810] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:26 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, 0x0, 0xc010) 01:50:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000580)=@framed={{0x8}}, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x10, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000640)='syzkaller\x00'}, 0x90) [ 1635.948578][ T7816] loop5: detected capacity change from 0 to 1024 [ 1635.971541][ T7821] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1636.003797][ T7817] loop2: detected capacity change from 0 to 1024 01:50:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x64, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000140)=""/10, 0x3e, 0xa, 0x1}, 0x20) 01:50:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, 0x0, 0xc010) 01:50:26 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+JSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6Y+/6I/7Ydfj9ovH7zrzzvvPMM1/7oWgD+L+1Oh/lx5HE6vxbG9l8Z6vW6mzVHvbqETEdEaWIcreI5N9pmn4WcTu6U3w1W1gMl4zazifNlXc+/6LzpDtXLqZ8/dJ+/Q5ns5hiLiKmirKvdLzx7hTlrWcOL+nvYZaw673EwbhdyK7EtGcuTdOf/u3L/ZYB1WG9Z84kRuB0Jd3n5h6zEReLCz17HdB9Kj7LI3XCbI47AAAAADgDL2zHdmzEpXHHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOdJ8fv/STGVevW5SHq//18plkVRnyzXjrb649OKAwAAAAAAAADO0LXt2I6NuNSbT5P8O//X85nL+d8vxQexHo1YixuxEfVoRzvWYjEiZgcGqmzU2+21xX7PmSE9p/KeS0N7Lh0Q6HRRVk9qzwEAAAAAAADgufJxrO58/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJMgiZjqFvl0uShvzUapHBEzEVHJ1tuM+Eevfi7MDF/8+KzjAAAAgDF4YTu2YyMu9ebTJH/P/0r+vn8mPohH0Y5mtKMVjbibfxbQfddf6mzVWp2t2sNs2jvud/91pDDyEaP72cPwLV/N16jGvWjmS27EnXgvWnE3SnnPzNVePMPj+lUWU3KrcMjI7hZltud/KMpTMvhhSvXg1WfzjFzoZ2ShiC3Lxov7Z+KIR2f3lhaj1A/28q4tDe5Ead+cT43c3sWizPbnd6eb8yPanYmlgbPvlf1zHvH1v/zpx/dbjx7cv7c+Pzm7dDi9g5X2FuzORC0+/smT6e5Z/OrznIk9FvJMXOnPr8YP4kcxH3PxdqxFM34W9WhHI+bi+3mtXpzPycAlPyJTt5+ae/ugSCrFcekerMPEVC5Wrsfred9L0YwfxntxNxrxZv5vKRbj27Ecy7EycK5f6WzVyoOxPx1IftWXRtxp068MDf76N4pKduv7/d5b4H8P2vvTk+X1xYG8Dt5zZ/O2wSU7WXrp5J9H5a8VlezU+HVxt58MuzOxOJCJl/fPxB/z28p669GDtfv19w+5vTeKMruOfnv4p8Tox86Jyc6Xl7KDlc89fXZkbS8PbVvM2y7320p72q7027pX6ubIK7VSvIbbO9JS3vbq0LZa3nZ1oG3Y6y0AJt7Fb16sVP9Z/Xv10+pvqverb818b/o7069V4sJfL0R5YeqN0mvJn+PT+MXO+38AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODZrX/40YN6q9VY21VJ0/SXI5rOc6X3I0DjDaMSk5GNY1XKR+r1nzRNiyXJBAR/QCUtTEo8+1auxamMPOYbE3DqbrYfvn9z/cOPvtV8WH+38W7j0cry8srCyvKbtZv3mq3GQvfvqN7lsw0WOFE7D/1xRwIAAAAAAAAAAAAc1ln8R4Vx7yMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwvq3OR/lxJLG4cGMhm+9s1VrZ1KvvrFmOiFJEJD+PSD6LuB3dKWYHhktGbeeT5so7n3/RebIzVrm3fmm/fkOVdy/YLKaYi4ipojyGp8a7c+zxkv4eZgm73kscjNv/AgAA//+x6wyy") 01:50:26 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000f00)="86", &(0x7f0000000280)="8d"}, 0x50) [ 1636.242988][ T7816] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1636.285382][ T7833] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:26 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380), 0x48) write$cgroup_subtree(r0, 0x0, 0x0) [ 1636.335513][ T7832] loop2: detected capacity change from 0 to 1024 01:50:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:26 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 01:50:26 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1636.546593][ T7789] loop1: detected capacity change from 0 to 32768 01:50:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xd, 0x0, 0x0, 0x0, 0x4}, 0x48) [ 1636.601890][ T7789] BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop1 scanned by syz-executor.1 (7789) [ 1636.629438][ T7841] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1636.667765][ T7789] BTRFS info (device loop1): first mount of filesystem c9fe44da-de57-406a-8241-57ec7d4412cf [ 1636.700850][ T7789] BTRFS info (device loop1): using crc32c (crc32c-intel) checksum algorithm 01:50:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:27 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="8d"}, 0x50) [ 1636.753178][ T7843] loop2: detected capacity change from 0 to 1024 [ 1636.763145][ T7846] loop5: detected capacity change from 0 to 1024 [ 1636.772535][ T7789] BTRFS info (device loop1): using free-space-tree 01:50:27 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x1b, 0x0, 0x0) [ 1636.866610][ T7854] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:27 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1636.985839][ T7846] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4}, 0x90) 01:50:27 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0xa, 0x2030, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:27 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x4, &(0x7f0000000640), 0x4) [ 1637.147798][ T7876] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1637.185388][ T7875] loop2: detected capacity change from 0 to 1024 [ 1637.193011][ T5095] BTRFS info (device loop1): last unmount of filesystem c9fe44da-de57-406a-8241-57ec7d4412cf 01:50:27 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:27 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x13, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:27 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x13, 0x20, 0x0, @prog_id}, 0x20) [ 1637.503117][ T7884] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:27 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@ifindex, 0xffffffffffffffff, 0x2c, 0x0, 0x0, @prog_fd}, 0x20) 01:50:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x3, 0x1, 0x0, 0x5, 0x1, 0x101, [{0x4, 0x0, 0xf2bb}]}]}, {0x0, [0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000340)=""/191, 0x36, 0xbf, 0x1}, 0x20) 01:50:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1637.659063][ T7890] loop2: detected capacity change from 0 to 1024 01:50:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="187da43c223ff9a29aa30b08a1dac8eae380242eb1484efede76ca87fd6def32cdc7096c49dc5aa37fd8498b1ab755f49fbd17f11f24d14063fd51e69d1de7d5942c8dbd8aed316443ba", 0x4a}, {0x0}], 0x2}, 0x40) [ 1637.771371][ T7892] loop5: detected capacity change from 0 to 1024 01:50:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x1a, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:28 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@ifindex, 0xffffffffffffffff, 0x1b, 0x44}, 0x20) [ 1637.829145][ T7900] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1637.896479][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:28 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:28 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)) [ 1638.032359][ T7892] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:28 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003380)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 1638.117482][ T7912] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:28 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x6480, 0x0) 01:50:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1638.258472][ T7913] loop2: detected capacity change from 0 to 1024 01:50:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_type(r0, &(0x7f0000000000), 0x9) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@bloom_filter={0x1e, 0x0, 0x8}, 0x48) 01:50:28 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x11}]}}, &(0x7f0000000140)=""/10, 0x26, 0xa, 0x1}, 0x20) 01:50:28 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1638.431707][ T7921] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:28 executing program 1: bpf$MAP_CREATE(0x6, &(0x7f0000004c40)=@bloom_filter, 0x48) 01:50:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:29 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x2092eea4cd0d317f}, 0x20) 01:50:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_type(r0, &(0x7f0000000000), 0x9) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1638.660007][ T7931] loop5: detected capacity change from 0 to 1024 [ 1638.671851][ T7930] loop2: detected capacity change from 0 to 1024 01:50:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) [ 1638.765401][ T7936] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:29 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1}, 0x4) socketpair(0xa, 0x0, 0x0, &(0x7f0000004bc0)) 01:50:29 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1638.942893][ T7931] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_type(r0, &(0x7f0000000000), 0x9) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1639.018492][ T7949] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1639.033550][ T7944] loop2: detected capacity change from 0 to 1024 01:50:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29}, 0x20) 01:50:29 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) [ 1639.094470][ T7944] hfsplus: request for non-existent node 1 in B*Tree [ 1639.155636][ T7944] hfsplus: request for non-existent node 1 in B*Tree 01:50:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1639.202783][ T7944] hfsplus: failed to load root directory 01:50:29 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c9vHFcdAPDvrDdrb4DUbZM2oEqxGqkgLBLbKxd8akAI+VChqhw4cVglm2aVTVrsLXIrBKb8unLoH1AOvnFC4h6pXLjArdc9RkLi0gtGQho0szPrjb3rH0ns3ZTPJxq/9+bNe/Od784P71rRBvB/a30xqg8iifXFN7eydm+n0entNO6V9YiYjYhKRLVfRPLvNE0/jbgR/SW+mq0spkvG7efj9trbn33ee9hvVYsl375y2Ljj2S6WWIiImaIcqDzZfDeL8o3HDi8ZHGGWsKtl4mDSzmVXYlpaSNP0p3/78qBnSH3U6LkziRE4XUn/uXnAfMT54kLPfg/oPxUf55E6ZbYnHQAAAACcged2Yze24sKk4wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBnSfH9/0mxVMr6QiTl9//XinVR1KfLlZNt/uC04gAAAAAAAACAM3RlN3ZjKy6U7TTJ/+b/at64mP/8Urwfm9GKjbgWW9GMbnRjI5YjYn5ootpWs9vdWB6MnBsxciYfuTJy5MoRgc4WZf1pHTkAAAAAAAAAfKF8FOt7f/8HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBpkETM9It8uVjW56NSjYhKRNSy7bYj/lHWnwlzo1c/OOs4AAAAYAKe243d2IoLZTtN8vf8L+Xv++fi/bgf3WhHNzrRilv5ZwH9d/2V3k6j09tp3MuWg/N+918nCqNWfLYwk7dG7flyvkU9bkc7X3Mtbsa70YlbUclHZi6X8YyO61dZTMkbhWNGdqsosyP/Q1GekuEPU+pHbz6fZ+TcICNLRWxZNp4/PBMnfHX272k5KoNgL+7b0/BBVA7N+czY/Z0vyux4fne6OT+h/ZlYGTr7Xjo85xFf/8uffnync//undubi9NzSMdTvlhpuWJ/Jhrx0U8ezvbP4pe/yJk4YCnPxKVBez1+ED+KxViIt2Ij2vGzaEY3WrEQ389rzeJ8ToYu+TGZuvFI662jIqkVr0v/xTpOTNVi42a8mo+9EO34Ybwbt6IVr+f/VmI5vh2rsRprQ+f6pd5Oozoc+6OB5Fd9ZcydNv3KyOCvfqOoZLe+3x+8Bf73qKM/PVlenx/K6/A9dz7vG16zl6UXnv7zqPq1opKdGr8u7vbTYX8mlocy8eLhmfhjflvZ7Ny/u3Gn+d4x9/daUWbX0W+P/5QY/9h5arLz5YXsxcpbj54dWd+LI/uW876Lg77Kgb5Lg77+lbo99kqtFb/DHZxpJe97eWRfI++7PNQ36vctAKbe+W+er9X/Wf97/ZP6b+p36m/OfW/2O7Ov1OLcX89FdWnmtcoryZ/jk/jF3vt/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg8W1+8OHdZqfT2thXSdP0l2O6nuVK+SVAkw2jFtORjSeqVE806j9pmhZrkikI/ohKWpiWeA6tXIlTmXnCNybg1F3v3nvv+uYHH36rfa/5Tuud1v211dW1pbXV1xvXb7c7raX+z3Gjq2cbLPBU7T30Jx0JAAAAAAAAAAAAcFxn8R8VJn2MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwLNtfTGqDyKJ5aVrS1m7t9PoZEtZ39uyGhGViEh+HpF8GnEj+kvMD02XjNvPx+21tz/7vPdwb65quX3lsHEjVfev2C6WWIiImaJ8Ao/Md/OJ50sGR5gl7GqZOJi0/wUAAP//0J4Mbg==") 01:50:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29}, 0x20) 01:50:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_type(r0, &(0x7f0000000000), 0x9) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:29 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001900)={0x6, 0x3, &(0x7f00000016c0)=@framed, &(0x7f00000017c0)='GPL\x00', 0x3, 0x7e, &(0x7f0000001800)=""/126}, 0x90) [ 1639.338795][ T6863] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1639.361890][ T7957] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1639.544476][ T7962] loop2: detected capacity change from 0 to 1024 [ 1639.577948][ T7961] loop5: detected capacity change from 0 to 1024 [ 1639.585026][ T7969] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001600)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0x38}, 0x0) 01:50:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xe}]}}, &(0x7f0000000140)=""/10, 0x26, 0xa, 0x1}, 0x20) 01:50:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1639.716100][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:30 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@map, 0xffffffffffffffff, 0x33, 0x201c}, 0x20) 01:50:30 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1639.786985][ T7961] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1639.872559][ T7978] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 01:50:30 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:30 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380), 0x48) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) [ 1640.032684][ T7982] loop2: detected capacity change from 0 to 1024 01:50:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1640.139201][ T7989] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:30 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:30 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001480)={@map, 0xffffffffffffffff, 0x15, 0x2004}, 0x20) 01:50:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x0, 0x0, 0x8}, 0x48) 01:50:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1640.383295][ T7997] loop5: detected capacity change from 0 to 1024 [ 1640.413402][ T7999] loop2: detected capacity change from 0 to 1024 01:50:30 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@union={0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x5f]}}, &(0x7f0000000080)=""/237, 0x2f, 0xed, 0x1}, 0x20) [ 1640.508651][ T8007] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'veth0_to_bond\x00'}) 01:50:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1640.662733][ T7997] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000640)='syzkaller\x00'}, 0x90) [ 1640.741113][ T8010] loop2: detected capacity change from 0 to 1024 [ 1640.764716][ T8019] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/216, 0x4e, 0xd8, 0x1}, 0x20) 01:50:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:31 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:31 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x4, &(0x7f0000000580)=@framed={{}, [@generic={0x1f, 0x0, 0x0, 0x0, 0xffffffff}]}, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:31 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@ifindex, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1641.017379][ T8027] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1641.123088][ T8029] loop2: detected capacity change from 0 to 1024 01:50:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 01:50:31 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380), 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={r0, &(0x7f0000000500)}, 0x20) 01:50:31 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1641.250265][ T8037] loop5: detected capacity change from 0 to 1024 01:50:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1641.332643][ T8041] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:31 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001900)={0x6, 0x5, &(0x7f00000016c0)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f00000017c0)='GPL\x00', 0x3, 0x7e, &(0x7f0000001800)=""/126}, 0x90) 01:50:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x8, 0x1, &(0x7f0000000100)=@raw=[@kfunc], 0x0}, 0x90) 01:50:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1641.441318][ T8047] loop2: detected capacity change from 0 to 1024 [ 1641.496140][ T8051] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x4, &(0x7f0000000580)=@framed={{}, [@generic={0x7}]}, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:31 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:31 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380), 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x20) 01:50:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1641.604605][ T8057] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:32 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d669646") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x4}, 0x90) 01:50:32 executing program 3: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x18c060ee70cc64a0}, 0x10) [ 1641.769137][ T8062] loop2: detected capacity change from 0 to 1024 01:50:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1641.841103][ T8067] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:32 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 01:50:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000540)="80240227c61045cf1102c66eee92d6b15acfa60d10ff6528aa9dd359dd07c1b4c84efdf1b55345080660e0028158a24c4cf642d66695226ca4591374dbdf17fc4c05f70edf49b1df6b5f6a02e68a45a9db5bb59c6d3e585380af43eb90c6efaecffa3651c3c9bf2a55ba14ce08cde923ae113ba143435e48d64ee27aa24fca4431e5c346e3af5e8ab683c603d6ba84648574033f87e119d30016f503757c12fd4440d17a398dc5d20aa0c7ceeb4f69b51ef414dfc9037eb788fae7836e284cbcc3df4ecfb00568", 0xc7}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 01:50:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1642.084632][ T8080] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1642.114022][ T8075] loop5: detected capacity change from 0 to 1024 [ 1642.116987][ T8077] loop2: detected capacity change from 0 to 1024 01:50:32 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x14, &(0x7f0000000640), 0x4) 01:50:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:32 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={@map, 0xffffffffffffffff, 0x24, 0x0, 0xffffffffffffffff, @prog_id=0xffffffffffffffff}, 0x20) 01:50:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:32 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1642.322007][ T8075] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1642.353349][ T8090] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 01:50:32 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d669646") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:32 executing program 1: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x2}, 0x48) [ 1642.534823][ T8097] loop2: detected capacity change from 0 to 1024 [ 1642.576638][ T8097] [ 1642.579010][ T8097] ====================================================== [ 1642.586039][ T8097] WARNING: possible circular locking dependency detected [ 1642.593239][ T8097] 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0 Not tainted [ 1642.600273][ T8097] ------------------------------------------------------ [ 1642.607297][ T8097] syz-executor.2/8097 is trying to acquire lock: [ 1642.613632][ T8097] ffff88802583d8f8 (&sbi->alloc_mutex){+.+.}-{3:3}, at: hfsplus_block_allocate+0x9e/0x8c0 [ 1642.623701][ T8097] 01:50:32 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0xa, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) [ 1642.623701][ T8097] but task is already holding lock: [ 1642.631075][ T8097] ffff888087a93dc8 (&HFSPLUS_I(inode)->extents_lock){+.+.}-{3:3}, at: hfsplus_file_extend+0x21b/0x1b70 [ 1642.633342][ T8100] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1642.642155][ T8097] [ 1642.642155][ T8097] which lock already depends on the new lock. [ 1642.642155][ T8097] [ 1642.642166][ T8097] [ 1642.642166][ T8097] the existing dependency chain (in reverse order) is: [ 1642.642176][ T8097] [ 1642.642176][ T8097] -> #1 (&HFSPLUS_I(inode)->extents_lock){+.+.}-{3:3}: [ 1642.679150][ T8097] lock_acquire+0x1e3/0x530 [ 1642.684218][ T8097] __mutex_lock+0x136/0xd70 [ 1642.689278][ T8097] hfsplus_get_block+0x383/0x14f0 [ 1642.694848][ T8097] block_read_full_folio+0x428/0xe20 [ 1642.700698][ T8097] filemap_read_folio+0x1a2/0x790 [ 1642.706277][ T8097] do_read_cache_folio+0x134/0x820 [ 1642.711947][ T8097] do_read_cache_page+0x30/0x200 [ 1642.717445][ T8097] hfsplus_block_allocate+0xee/0x8c0 [ 1642.723288][ T8097] hfsplus_file_extend+0xade/0x1b70 [ 1642.729029][ T8097] hfsplus_get_block+0x406/0x14f0 [ 1642.734596][ T8097] __blockdev_direct_IO+0x1d6f/0x49b0 [ 1642.740510][ T8097] hfsplus_direct_IO+0xf8/0x1e0 [ 1642.745900][ T8097] generic_file_direct_write+0x1e9/0x400 [ 1642.752092][ T8097] __generic_file_write_iter+0x129/0x230 [ 1642.758282][ T8097] generic_file_write_iter+0xaf/0x310 [ 1642.764210][ T8097] vfs_write+0xa83/0xcb0 [ 1642.769007][ T8097] ksys_write+0x1a0/0x2c0 [ 1642.773892][ T8097] do_syscall_64+0xfb/0x240 [ 1642.778951][ T8097] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 1642.785402][ T8097] [ 1642.785402][ T8097] -> #0 (&sbi->alloc_mutex){+.+.}-{3:3}: [ 1642.793254][ T8097] validate_chain+0x18ca/0x58e0 [ 1642.798654][ T8097] __lock_acquire+0x1345/0x1fd0 [ 1642.804067][ T8097] lock_acquire+0x1e3/0x530 [ 1642.809130][ T8097] __mutex_lock+0x136/0xd70 [ 1642.814190][ T8097] hfsplus_block_allocate+0x9e/0x8c0 [ 1642.820128][ T8097] hfsplus_file_extend+0xade/0x1b70 [ 1642.825869][ T8097] hfsplus_bmap_reserve+0x105/0x4e0 [ 1642.831615][ T8097] hfsplus_create_cat+0x1b0/0x1b60 [ 1642.837277][ T8097] hfsplus_fill_super+0x13ee/0x1ca0 [ 1642.843032][ T8097] mount_bdev+0x20c/0x2d0 [ 1642.847925][ T8097] legacy_get_tree+0xf0/0x190 [ 1642.853161][ T8097] vfs_get_tree+0x92/0x2a0 [ 1642.858220][ T8097] do_new_mount+0x2be/0xb40 [ 1642.863294][ T8097] __se_sys_mount+0x2d9/0x3c0 [ 1642.868527][ T8097] do_syscall_64+0xfb/0x240 [ 1642.873586][ T8097] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 1642.880042][ T8097] [ 1642.880042][ T8097] other info that might help us debug this: [ 1642.880042][ T8097] [ 1642.890278][ T8097] Possible unsafe locking scenario: [ 1642.890278][ T8097] [ 1642.897739][ T8097] CPU0 CPU1 [ 1642.903197][ T8097] ---- ---- [ 1642.908565][ T8097] lock(&HFSPLUS_I(inode)->extents_lock); [ 1642.914379][ T8097] lock(&sbi->alloc_mutex); [ 1642.921496][ T8097] lock(&HFSPLUS_I(inode)->extents_lock); [ 1642.929825][ T8097] lock(&sbi->alloc_mutex); [ 1642.934422][ T8097] [ 1642.934422][ T8097] *** DEADLOCK *** [ 1642.934422][ T8097] [ 1642.942559][ T8097] 4 locks held by syz-executor.2/8097: [ 1642.948011][ T8097] #0: ffff8880821100e0 (&type->s_umount_key#51/1){+.+.}-{3:3}, at: alloc_super+0x20e/0x8f0 [ 1642.958163][ T8097] #1: ffff88802583d998 (&sbi->vh_mutex){+.+.}-{3:3}, at: hfsplus_fill_super+0x1380/0x1ca0 [ 1642.968225][ T8097] #2: ffff88803fce00b0 (&tree->tree_lock){+.+.}-{3:3}, at: hfsplus_find_init+0x14a/0x1c0 [ 1642.978269][ T8097] #3: ffff888087a93dc8 (&HFSPLUS_I(inode)->extents_lock){+.+.}-{3:3}, at: hfsplus_file_extend+0x21b/0x1b70 [ 1642.989794][ T8097] [ 1642.989794][ T8097] stack backtrace: [ 1642.995675][ T8097] CPU: 0 PID: 8097 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0 [ 1643.006007][ T8097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1643.016068][ T8097] Call Trace: [ 1643.019347][ T8097] [ 1643.022280][ T8097] dump_stack_lvl+0x1e7/0x2e0 [ 1643.026983][ T8097] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1643.032207][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.037065][ T8097] ? print_circular_bug+0x12f/0x1a0 [ 1643.042287][ T8097] check_noncircular+0x36a/0x4a0 [ 1643.047237][ T8097] ? __pfx_validate_chain+0x10/0x10 [ 1643.052444][ T8097] ? __pfx_check_noncircular+0x10/0x10 [ 1643.057910][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.062765][ T8097] ? lockdep_lock+0x123/0x2b0 [ 1643.067461][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.072313][ T8097] ? _find_first_zero_bit+0xd4/0x100 [ 1643.077609][ T8097] validate_chain+0x18ca/0x58e0 [ 1643.082473][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.087333][ T8097] ? __pfx_validate_chain+0x10/0x10 [ 1643.092632][ T8097] ? validate_chain+0x11b/0x58e0 [ 1643.097572][ T8097] ? __pfx_validate_chain+0x10/0x10 [ 1643.102778][ T8097] ? __pfx_validate_chain+0x10/0x10 [ 1643.108069][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.112921][ T8097] ? mark_lock+0x9a/0x350 [ 1643.117258][ T8097] ? __lock_acquire+0x1345/0x1fd0 [ 1643.122304][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.127156][ T8097] ? mark_lock+0x9a/0x350 [ 1643.131494][ T8097] __lock_acquire+0x1345/0x1fd0 [ 1643.136374][ T8097] lock_acquire+0x1e3/0x530 [ 1643.140895][ T8097] ? hfsplus_block_allocate+0x9e/0x8c0 [ 1643.146385][ T8097] ? __pfx_lock_acquire+0x10/0x10 [ 1643.151422][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.156275][ T8097] ? __pfx___might_resched+0x10/0x10 [ 1643.161580][ T8097] __mutex_lock+0x136/0xd70 [ 1643.166099][ T8097] ? hfsplus_block_allocate+0x9e/0x8c0 [ 1643.171580][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.176434][ T8097] ? rcu_is_watching+0x15/0xb0 [ 1643.181212][ T8097] ? hfsplus_block_allocate+0x9e/0x8c0 [ 1643.186690][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.191542][ T8097] ? __pfx___mutex_lock+0x10/0x10 [ 1643.196584][ T8097] ? __mutex_lock+0x2ee/0xd70 [ 1643.201285][ T8097] ? hfsplus_file_extend+0x21b/0x1b70 [ 1643.206664][ T8097] hfsplus_block_allocate+0x9e/0x8c0 [ 1643.211972][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.216859][ T8097] hfsplus_file_extend+0xade/0x1b70 [ 1643.222093][ T8097] ? __pfx_hfsplus_file_extend+0x10/0x10 [ 1643.227729][ T8097] ? rcu_is_watching+0x15/0xb0 [ 1643.232512][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.237364][ T8097] ? trace_contention_end+0x3c/0x100 [ 1643.242657][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.247509][ T8097] ? __mutex_lock+0x2ee/0xd70 [ 1643.252210][ T8097] ? hfsplus_find_init+0x14a/0x1c0 [ 1643.257335][ T8097] ? __pfx___mutex_lock+0x10/0x10 [ 1643.262380][ T8097] ? rcu_is_watching+0x15/0xb0 [ 1643.267168][ T8097] hfsplus_bmap_reserve+0x105/0x4e0 [ 1643.272387][ T8097] hfsplus_create_cat+0x1b0/0x1b60 [ 1643.277515][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.282379][ T8097] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 1643.288288][ T8097] ? __pfx_hfsplus_create_cat+0x10/0x10 [ 1643.293879][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.298727][ T8097] ? do_raw_spin_unlock+0x13b/0x8b0 [ 1643.303938][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.308787][ T8097] ? _raw_spin_unlock+0x28/0x50 [ 1643.313648][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.318504][ T8097] ? hfsplus_new_inode+0x53e/0x6c0 [ 1643.323624][ T8097] hfsplus_fill_super+0x13ee/0x1ca0 [ 1643.328851][ T8097] ? __pfx_hfsplus_fill_super+0x10/0x10 [ 1643.334450][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.339302][ T8097] ? snprintf+0xda/0x120 [ 1643.343548][ T8097] ? __pfx_lock_release+0x10/0x10 [ 1643.348588][ T8097] ? do_raw_spin_lock+0x14e/0x370 [ 1643.353629][ T8097] ? sb_set_blocksize+0x99/0x100 [ 1643.358582][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.363435][ T8097] ? setup_bdev_super+0x4c8/0x5c0 [ 1643.368478][ T8097] mount_bdev+0x20c/0x2d0 [ 1643.372825][ T8097] ? __pfx_hfsplus_fill_super+0x10/0x10 [ 1643.378392][ T8097] ? __pfx_mount_bdev+0x10/0x10 [ 1643.383269][ T8097] ? vfs_parse_fs_string+0x190/0x230 [ 1643.388574][ T8097] legacy_get_tree+0xf0/0x190 [ 1643.393264][ T8097] ? __pfx_hfsplus_mount+0x10/0x10 [ 1643.398395][ T8097] vfs_get_tree+0x92/0x2a0 [ 1643.402830][ T8097] do_new_mount+0x2be/0xb40 [ 1643.407351][ T8097] ? ns_capable+0x89/0xf0 [ 1643.411704][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.416562][ T8097] ? __pfx_do_new_mount+0x10/0x10 [ 1643.421616][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.426473][ T8097] __se_sys_mount+0x2d9/0x3c0 [ 1643.431168][ T8097] ? __pfx___se_sys_mount+0x10/0x10 [ 1643.436388][ T8097] ? do_syscall_64+0x108/0x240 [ 1643.441168][ T8097] ? srso_return_thunk+0x5/0x5f [ 1643.446021][ T8097] ? __x64_sys_mount+0x20/0xc0 [ 1643.450803][ T8097] do_syscall_64+0xfb/0x240 [ 1643.455326][ T8097] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 1643.461238][ T8097] RIP: 0033:0x7fc92147f4aa [ 1643.465655][ T8097] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1643.485268][ T8097] RSP: 002b:00007fc922222ef8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1643.493687][ T8097] RAX: ffffffffffffffda RBX: 00007fc922222f80 RCX: 00007fc92147f4aa [ 1643.501662][ T8097] RDX: 0000000020000040 RSI: 0000000020000200 RDI: 00007fc922222f40 [ 1643.509637][ T8097] RBP: 0000000020000040 R08: 00007fc922222f80 R09: 0000000000200000 [ 1643.517613][ T8097] R10: 0000000000200000 R11: 0000000000000202 R12: 0000000020000200 [ 1643.525587][ T8097] R13: 00007fc922222f40 R14: 0000000000000671 R15: 0000000020000240 [ 1643.533750][ T8097] [ 1643.562205][ T8109] loop5: detected capacity change from 0 to 1024 01:50:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x4f]}}, &(0x7f00000002c0)=""/216, 0x2b, 0xd8, 0x1}, 0x20) 01:50:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x33, 0x12, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00'}, 0x90) 01:50:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x8) [ 1643.714018][ T8109] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1643.726476][ T8117] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:34 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)={@ifindex, 0xffffffffffffffff, 0x19, 0x0, 0x0, @prog_fd}, 0x20) 01:50:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:34 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d669646") r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:34 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:34 executing program 1: bpf$LINK_GET_FD_BY_ID(0x23, 0x0, 0x0) 01:50:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) [ 1643.915336][ T8127] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:34 executing program 1: bpf$MAP_CREATE(0x15, &(0x7f0000004c40)=@bloom_filter, 0x48) [ 1644.079322][ T8133] loop5: detected capacity change from 0 to 1024 [ 1644.088224][ T8134] loop2: detected capacity change from 0 to 1024 [ 1644.119346][ T8140] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1644.152989][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:34 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:34 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000100)) 01:50:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) [ 1644.208348][ T8133] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:34 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) [ 1644.275245][ T8149] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0xd, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:34 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1hvbGyB126QNqFKsRioIi8T2ygWfGhBCPlSoKgdOHFbJplllkxZ7i9wKgSlfVw79A8rBN05I3COVCxe49brHSEhcesFISINmdma9sXftdRJ7N+X3i8bvO/PO+84zz3zth6IN4P/WxlJUH0QSG0tvbmfz3d16u7tbv1fWI2IuIioR1V4Ryb/TNP004kb0pvhqtrAYLhm1nY9b629/9nn3YW+uWkz5+pWj+o1np5hiMSJmirKv8mTj3SzKNx47vKS/h1nCrpaJg0k7l12JaWkxTdOf/u3L/ZYBtWG9588kRuB0Jb3n5iELEeeLCz17HdB7Kj7OI3XK7Ew6AAAAADgDz+3FXmzHhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPXFSMrf/58tlkVRny5XTrb6g9OKAwAAAAAAAADO0JW92IvtuFDOp0n+nf+r+czF/O+X4v3YimZsxrXYjkZ0ohObsRIRCwMDzW43Op3NlX7P+SE9Z/Keq0N7rh4T6FxR1p7WngMAAAAAAADAF8pHsbH//T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEyDJGKmV+TTxbK+EJVqRMxHrz12Iv4REbOTjnds88MXPzjrOAAAAGACntuLvdiOC+V8muTv+V/K3/fPx/txPzrRik60oxm38s8Ceu/6K93deru7W7+XTYfH/e6/ThRGPmL52cLQLV/O16jF7WjlS67FzXg32nErKnnPzOUynuFx/SqLKXmjMGZkt4oy2/M/FOUpGfwwpXb86gt5Rs71M7JcxJZl4/mjM3HCo3NwSytR6Qd78cCWBneicmTOZ0Zu73xRZvvzu9PN+QkdzMTqwNn30tE5j/j6X/704zvt+3fv3N5amp5dGk95sNJywcFM1OOjnzyc653FL3+RM3HIcp6JS/35jfhB/CiWYjHeis1oxc+iEZ1oxmJ8P681ivM5GbjkR2TqxiNzbx0XyWxxXHoHa5yYqsXKjXg173shWvHDeDduRTNez/+txkp8O9ZiLdYHzvVL3d16dTD2RwPJr/rKiDtt+pWhwV/9RlHJbn2/P3wL/O9xe396srw+P5DXwXvuQt42uGQ/Sy88/edR9WtFJTs1fl3c7afDwUysDGTixaMz8cf8trLVvn93807jvTG391pRZtfRb8d/Sox+7Dw12fnyQnaw8rlHz46s7cWhbSt528V+W+VQ26V+W+9K3Rl5pc4Wr+EOj7Sat708tK2et10eaBv2eguAqXf+m+dna/+s/b32Se03tTu1N+e/N/eduVdm49xfz0V1eea1yivJn+OT+MX++38AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODxbX3w4d1Gu93cPFBJ0/SXI5qe5Ur5I0CTDWM2piMbT1SpnqjXf9I0LZYkUxD8MZW0MC3xHFm5Eqcy8oRvTMCpu9659971rQ8+/FbrXuOd5jvN++tra+vL62uv16/fbrWby72/o3pXzzZY4Knaf+hPOhIAAAAAAAAAAABgXGfxHxUmvY8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAs21jKaoPIomV5WvL2Xx3t97OprK+v2Y1IioRkfw8Ivk04kb0plgYGC4ZtZ2PW+tvf/Z59+H+WNVy/cpR/YaqHlywU0yxGBEzRfkEHhnv5hOPl/T3MEvY1TJxMGn/CwAA//8tYQxx") 01:50:34 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:34 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(0x0, &(0x7f0000000440), &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 01:50:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0xd, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000640)='syzkaller\x00'}, 0x90) 01:50:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1644.447199][ T8162] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1644.468029][ T8164] loop2: detected capacity change from 0 to 1024 01:50:34 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 01:50:34 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:35 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0xf, &(0x7f0000000cc0)=@ringbuf, &(0x7f0000000dc0)='syzkaller\x00', 0x8, 0x53, &(0x7f0000000e00)=""/83}, 0x90) [ 1644.604338][ T8174] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 01:50:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1644.685721][ T8177] loop5: detected capacity change from 0 to 1024 01:50:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1644.765244][ T8182] loop2: detected capacity change from 0 to 1024 01:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) [ 1644.814133][ T8191] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1644.823007][ T8177] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:35 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(0x0, &(0x7f0000000440), &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:35 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1645.018487][ T8201] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) [ 1645.120282][ T8205] loop2: detected capacity change from 0 to 1024 [ 1645.200892][ T8214] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1645.215076][ T8211] loop5: detected capacity change from 0 to 1024 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:35 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Ox6Y+/a6/hjN+X3i8bvO/PO+84zz3zth6IN4P/W+mKUH0US64tvbmXznZ1aq7NTe9CrR8RsRJQiyt0ikn+nafppxK3oTvHVbGExXDJqOx83197+7PPO4+5cuZjy9UuH9RvPdjHFQkTMFGVf6WTj3S7KN546vKS/h1nCrvcSB5N2IbsS056FNE1/+rcv91sGVIf1njuXGIGzlXSfmwfMR1wsLvTsdUD3qfg0j9Qpsz3pAAAAAOAcPLcbu7EVlyYdBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADxLit//T4qp1KsvRNL7/f9KsSyK+nS5drzVH51VHAAAAAAAAABwjq7txm5sxaXefJrk3/m/ms9czv9+Kd6PzWjERtyIrahHO9qxEcsRMT8wUGWr3m5vLPd7zg3pOZP3XBnac+WIQGeLsnpaew4AAAAAAAAAXygfxfre9/8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANkoiZbpFPl3v1+SiVI2IuImaz9bYj/hERlUnHO7a54YsfnXccAAAAMAHP7cZubMWl3nya5O/5X8rf98/F+/Ew2tGMdrSiEXfyzwK67/pLnZ1aq7NTe5BNB8f97r+OFUY+YnQ/exi+5av5GtW4G818yY24He9GK+5EKe+ZudqLZ3hcv8piSt4ojBnZnaLM9vwPRXlGBj9MqR69+nyekQv9jCwVsWXZeP7wTBzz6Ozf0nKU+sFe3relwZ0oHZrzmZHbu1iU2f787mxzfkz7M7EycPa9dHjOI77+lz/9+F7r4f17dzcXp2eXxtM7WGlvwf5M1OKjnzye7Z7FL3+RM3HAUp6JK/359fhB/CgWYyHeio1oxs+iHu1oxEJ8P6/Vi/M5GbjkR2Tq1hNzbx0VSaU4Lt2DNU5M5WLlerya970UzfhhvBt3ohGv5/9WYjm+HauxGmsD5/qVzk6tPBj7k4HkV31pxJ02/crQ4K9/o6hkt77fH7wF/veovT87WV6fH8jr4D13Pm8bXLKXpRdO/3lU/lpRyU6NXxd3++mwPxPLA5l48fBM/DG/rWy2Ht7fuFd/b8ztvVaU2XX02/GfEqMfO6cmO19eyA5WPvfk2ZG1vTi0bTlvu9xvKx1ou9Jv616p2yOv1ErxGu7gSCt528tD22p529WBtmGvtwCYehe/ebFS/Wf179VPqr+p3qu+Ofe92e/MvlKJC3+9EOWlmddKryR/jk/iF3vv/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgKe3+cGH9+utVmNjXyVN01+OaHqWK70fAZpsGJWYjmycqFI+Vq//pGlaLEmmIPgjKmlhWuI5tHItzmTkCd+YgDN3s/3gvZubH3z4reaD+juNdxoP11ZX15bWVl+v3bzbbDWWun9H9S6fb7DAqdp76E86EgAAAAAAAAAAAGBc5/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xyo8iieWlG0vZfGen1sqmXn1vzXJElCIi+XlE8mnErehOMT8wXDJqOx83197+7PPO472xyr31S4f1G6q8f8F2McVCRMwU5Qk8Md7tE4+X9PcwS9j1XuJg0v4XAAD///4sDHU=") [ 1645.247315][ T5315] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:50:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:35 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) [ 1645.393118][ T8211] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1645.425697][ T8224] loop2: detected capacity change from 0 to 1024 [ 1645.453550][ T8232] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:35 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$eJzs3c1vHGcZAPBn1pu1N0DqtkkbUKVYjVQQFontlQs+NSCEfKhQVQ6cOKySTbPKJi32FrkVAlO+rhz6B5SDb5yQuEcqFy5w63WPkZC49IKRkAbN7Mx6Y+/6I4m9m/L7ReP3nXnnfeeZZ772Q9EG8H9rfTGqDyKJ9cU3t7L53k6j09tp3CvrETEbEZWIar+I5N9pmn4acSP6U3w1W1gMl4zbzsfttbc/+7z3sD9XLaZ8/cph/Y5nu5hiISJminKg8mTj3SzKNx47vGSwh1nCrpaJg0k7l12JaWkhTdOf/u3Lg5Yh9VG9584kRuB0Jf3n5gHzEeeLCz17HdB/Kj7OI3XKbE86AAAAADgDz+3GbmzFhUnHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM+S4vf/k2KqlPWFSMrf/68Vy6KoT5crJ1v9wWnFAQAAAAAAAABn6Mpu7MZWXCjn0yT/zv/VfOZi/vdL8X5sRis24lpsRTO60Y2NWI6I+aGBalvNbndjedBzbkTPmbznysieK0cEOluU9ae15wAAAAAAAADwhfJRrO99/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANMgiZjpF/l0sazPR6UaEXMRUcvW2474R1l/JsyNXvzgrOMAAACACXhuN3ZjKy6U82mSv+d/KX/fPxfvx/3oRju60YlW3Mo/C+i/66/0dhqd3k7jXjYdHPe7/zpRGPmI0f/sYfSWL+dr1ON2tPMl1+JmvBuduBWVvGfmchnP6Lh+lcWUvFE4ZmS3ijLb8z8U5SkZ/jClfvTq83lGzg0yslTElmXj+cMzccKjs39Ly1EZBHtx35aGd6JyaM5nxm7vfFFm+/O70835Ce3PxMrQ2ffS4TmP+Ppf/vTjO537d+/c3lycnl06nvJgpeWC/ZloxEc/eTjbP4tf/iJn4oClPBOXBvPr8YP4USzGQrwVG9GOn0UzutGKhfh+XmsW53MydMmPydSNR+beOiqSWnFc+gfrODFVi5Wb8Wre90K044fxbtyKVrye/1uJ5fh2rMZqrA2d65d6O43qcOyPBpJf9ZUxd9r0KyODv/qNopLd+n5/8Bb436P2/vRkeX1+KK/D99z5vG14yV6WXnj6z6Pq14pKdmr8urjbT4f9mVgeysSLh2fij/ltZbNz/+7GneZ7x9zea0WZXUe/Pf5TYvxj56nJzpcXsoOVzz16dmRtL45sW87bLg7aKgfaLg3a+lfq9tgrtVa8hjs40kre9vLItkbednmobdTrLQCm3vlvnq/V/1n/e/2T+m/qd+pvzn1v9juzr9Ti3F/PRXVp5rXKK8mf45P4xd77fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PFtfvDh3Wan09rYV0nT9Jdjmp7lSvkjQJMNoxbTkY0nqlRP1Os/aZoWS5IpCP6ISlqYlngOrVyJUxl5wjcm4NRd79577/rmBx9+q32v+U7rndb9tdXVtaW11dcb12+3O62l/t9xvatnGyzwVO099CcdCQAAAAAAAAAAAHBcZ/EfFSa9jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCzbX0xqg8iieWla0vZfG+n0cmmsr63ZjUiKhGR/Dwi+TTiRvSnmB8aLhm3nY/ba29/9nnv4d5Y1XL9ymH9RqruX7BdTLEQETNF+QQeGe/mE4+XDPYwS9jVMnEwaf8LAAD//4n9DHQ=") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(0x0, &(0x7f0000000440), &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:35 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:35 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:36 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1645.699015][ T8247] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], 0x0, 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1645.788188][ T8248] loop2: detected capacity change from 0 to 1024 01:50:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) [ 1645.855841][ T8250] loop5: detected capacity change from 0 to 1024 01:50:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], 0x0, 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1645.940158][ T8257] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:36 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1645.996331][ T8250] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], 0x0, 0x4, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:36 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1646.186317][ T8272] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1646.209124][ T8269] loop2: detected capacity change from 0 to 1024 01:50:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xaf, &(0x7f0000000100)=""/175}, 0x90) 01:50:36 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") 01:50:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) [ 1646.341828][ T8278] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) [ 1646.459482][ T8283] loop2: detected capacity change from 0 to 1024 [ 1646.487888][ T8286] loop5: detected capacity change from 0 to 1024 [ 1646.498508][ T8290] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000007c0)=ANY=[], 0x0, 0x55}, 0x20) 01:50:36 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1646.635696][ T8286] xt_CT: You must specify a L4 protocol and not use inversions on it 01:50:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) [ 1646.677673][ T8303] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:37 executing program 3: bpf$MAP_CREATE(0xf, &(0x7f0000004c40)=@bloom_filter, 0x48) 01:50:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1646.736452][ T8305] loop2: detected capacity change from 0 to 1024 01:50:37 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="4a0bed0e325e05d9b92647001413f692a6f7f24b3e1ab2e47e4a65a49fd7a126638b9d6638ae26a6c462037e6d5163b0e54028e36247d3f10bc787160c0fa8fcae797acdc10265192ea327cb01c197c459c715fc1a1b23f7e6c88d436535a55aaeb3586a4b34ff0bc3f16f530aa57008d0b3f05dcd64c6e03e0877fc3416a9b4f233a4da88696f6ccf3a1b99b974d67dc4163ef99acaac629635ef65c07d11b757eb54bedd216f1364799b174ff860a1852947638e9890136f39b08566551861ffb5ed409775352ee5e4057947ba7079f682720b973baee7f465847e435537b8228d7a2451e887f1ab0625e8ebb7adaf9df19c7c69ca172a6cc859", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="21d6e76434b7c328723344cb2e362e20a1037e91684cf8763779059c53ff1dc5d7db9b75a0f6013622e017174803f2462016eb062eeac4c7444a07c3bdae42c095f6af189979b650059e66056dc69d92cee017df3445123103ad096173480d66964651") r4 = add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) stat(&(0x7f0000000680)='./bus\x00', &(0x7f0000000e40)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000bc0)='memory.events\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x3fe00) 01:50:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:37 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./bus\x00', 0x40841, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYBLOB="d161c082ad89da4abba87feb1da864275baddade6bb32e51e2dbd68dc93d8f8f6b9904f67e90f49327f0415bc8589fe0a49732bea2bf7e5be8f83a3fc13aaefae61bc925b4c191e1cd1c9ca6780291754f8ff9f88136342c448b2de14b464231ac3afacdcdf18d34420a4230d4103567a93a59e0414ffddbdb911b2552f2f5c8f18001a0f209905cecf7fd644e2a8d081797284283fcc150fece974efc1eca4966e72cd56266439175931c330a0f80ef773680908c1870fcb4147ead1fa29fb0d1fa97d865dd83f4bbbdf3ee43c50ad08bcd62c6da363e423b2a"], 0x5, 0x671, &(0x7f0000000c00)="$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") [ 1646.844327][ T8309] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) 01:50:37 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x10, 0x20, 0xffffffffffffffff, @prog_id}, 0x20) 01:50:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) 01:50:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) 01:50:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:37 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x1f, 0x2026, 0x0, @prog_id}, 0x20) [ 1647.017739][ T8322] dlm: plock device version mismatch: kernel (1.2.0), user (1.33554432.0) [ 1647.032953][ T8320] loop5: detected capacity change from 0 to 1024 01:50:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)="18", 0x1}], 0x1}, 0x0) 01:50:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x3, 0xe29, 0x3}, 0x48) readv(r0, &(0x7f0000002240)=[{&(0x7f0000000000)=""/201, 0xffffffffffffff88}, {0x0}], 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r1, &(0x7f0000000040)={0x1000000, 0x2000000, 0x0, 0x0, 0x0, "82b0cfc433790d771538be0631e8bd34100000880100000091d9b225a9a16a584db01a0074000096afda2a87223ba7f4"}, 0x40) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) [ 1647.079901][ T8318] loop2: detected capacity change from 0 to 1024 01:50:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x8) [ 1647.128365][ T8320] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1647.155759][ T8318] hfsplus: invalid catalog btree flag 01:50:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) 01:50:37 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000c80)='D', 0x1}], 0x1}, 0x490c4) sendmsg$sock(r0, &(0x7f0000003300)={0x0, 0x0, 0x0}, 0x0) [ 1647.179555][ T8318] hfsplus: failed to load catalog file 01:50:37 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x671, &(0x7f0000000c00)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/193, 0xc1, 0x0, &(0x7f00000005c0)=""/233, 0xe9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @alu={0x4, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @generic={0x0, 0x4, 0x4, 0x3ff, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xf1, &(0x7f00000003c0)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000180)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f0000000700)=[r1, r1, r1, r1], &(0x7f0000000740)=[{0x2, 0x5, 0x4}, {0x0, 0x2, 0x10}, {0x0, 0x0, 0x5, 0x8}, {0x5, 0x4, 0xf, 0x7}, {0x0, 0x4, 0xc, 0x9}], 0x10, 0x8000}, 0x90) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_timedreceive(r1, &(0x7f0000000240)=""/144, 0x90, 0x4, &(0x7f00000000c0)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000004ec0)=ANY=[@ANYBLOB="1800000000000000000020000000000895"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='contention_begin\x00', r3}, 0x10) syz_clone(0x10000000, &(0x7f0000000cc0)="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", 0xfb, &(0x7f0000000140), &(0x7f0000000640), &(0x7f0000000dc0)="