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"/4096, @ANYRES8, @ANYBLOB="d9e9aee9afb18270208988e87b8ee46c4e5fcb4148906b1b4cc6510d7df0cb3154fa4fe7e2ba6d0c10506d56b1b50613a52ea8787081c5f468b6143e7169d85d3198d422ba8211fecb99b77d0f9876c6e8364dc8a3072f3560ad0fb8d8d79f7c52870eb4b82ad228210fdbe3fb8556e17e922ab874a77720680a0d285fb45a2ba45bb4283a5e83070707102c25be0ede5d304e9bc132a5195ee22ada3e68fdc44c050b5d9744295b2dd946aa260fce3c7a33983552f2a761eba99aacde515f6e9b72cbdcfd23a767671c0b9ac69da2f85839ee4dc83b8c64e50b64ff5df7f603295422533ec4", @ANYRESDEC, @ANYRES64=r1], 0xd, 0x2a9, &(0x7f0000000480)="$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") r8 = open(&(0x7f00000008c0)='./file0\x00', 0x4460c2, 0x0) r9 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r8, &(0x7f0000000600)="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", 0x200) sendfile(r8, r9, 0x0, 0xef84) sendmsg$NFC_CMD_START_POLL(0xffffffffffffffff, 0x0, 0x0) write$nci(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x5) read$nci(r5, &(0x7f00000005c0)=""/100, 0x64) write$nci(r5, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c1004", @ANYRES16=r10, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32=r2, @ANYBLOB="488900"/17], 0x1c}}, 0x0) read$nci(r1, &(0x7f0000000200)=""/100, 0x64) write$nci(r1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x6) read$nci(r1, &(0x7f00000002c0)=""/100, 0x64) write$nci(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="4001000000000000000000000000000014000000"], 0x14) read$nci(r1, &(0x7f0000000380)=""/100, 0x64) write$nci(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="410000006fb713499e2cef2151a36ce78de89e20e545fd604fdf401f2906574ab0dcd48f652114f9357a2cbb8ecf1493f21309236f3eff41f8c8924b66501dcd31acfa630d530da99cf4b37e9c6ac665660cbd2cc5c646312247ab2e94be462380295cd97999fed4cc03ea6bacc968f0487134b65b7ee9164f5bb9d7b62ae219e5babcba6d48a0a36485bc2338"], 0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) sendmsg$NFC_CMD_START_POLL(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYRES8=r6, @ANYRES16=r7, @ANYBLOB="000123010000340200000600000008000100", @ANYRES32=r2, @ANYRESHEX=0x0], 0x24}}, 0x0) write$nci(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x4f) [ 51.897099][ T4848] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.920822][ T4890] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 04:54:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000002000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0xa, 0xde, &(0x7f0000000340)=""/222, 0x41000, 0x8}, 0x90) 04:54:41 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x50}}, 0x0) [ 51.941186][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.948369][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.970617][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.977728][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state 04:54:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0x9, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000240), &(0x7f0000000980)=@tcp}, 0x20) 04:54:41 executing program 1: mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) [ 52.018531][ T4890] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.042662][ T5066] loop2: detected capacity change from 0 to 256 [ 52.051906][ T5066] FAT-fs (loop2): Unrecognized mount option "ÿÿÿÿÿÿÿÿ00000000000000000006ÿÿ¿ÄØR¢ˆ“~© ]Ñôf õ5¢Ä6㇄yeð0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x81) [ 52.270065][ T4890] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 52.279383][ T4890] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 52.289940][ T4848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.297890][ T4890] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 52.307031][ T4890] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 52.339945][ T3733] hsr_slave_0: left promiscuous mode [ 52.345849][ T3733] hsr_slave_1: left promiscuous mode [ 52.351757][ T3733] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 52.359252][ T3733] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 52.367016][ T3733] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 52.374736][ T3733] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 52.383496][ T3733] veth1_macvtap: left promiscuous mode [ 52.389013][ T3733] veth0_macvtap: left promiscuous mode [ 52.394660][ T3733] veth1_vlan: left promiscuous mode [ 52.399899][ T3733] veth0_vlan: left promiscuous mode [ 52.474632][ T3733] team0 (unregistering): Port device team_slave_1 removed [ 52.485182][ T3733] team0 (unregistering): Port device team_slave_0 removed [ 52.543979][ T4890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.558382][ T4890] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.569946][ T3171] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.577051][ T3171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.589040][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.596121][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.623852][ T4890] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.666582][ T4848] veth0_vlan: entered promiscuous mode [ 52.677590][ T4848] veth1_vlan: entered promiscuous mode [ 52.688438][ T4890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.708133][ T4848] veth0_macvtap: entered promiscuous mode [ 52.716346][ T4848] veth1_macvtap: entered promiscuous mode [ 52.729188][ T4848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 52.739749][ T4848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 52.749595][ T4848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 52.760108][ T4848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 52.770228][ T4848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 52.780763][ T4848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:54:42 executing program 2: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) [ 52.808894][ T4848] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 52.822235][ T4848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 52.832890][ T4848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 52.842776][ T4848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 52.853264][ T4848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 52.863129][ T4848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 52.873688][ T4848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 52.874761][ T4848] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 52.876133][ T4848] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.900788][ T4848] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 04:54:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x2}}, 0x20) 04:54:42 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = dup(r6) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000f55d12ba7182e679897ea6c6f0d5b32fbc1de7e3478f7eb06f528c98a3af1c8795a7325d1e3adcca41ec302ac8b54a334064f1451e71ddb4a0e0ae3880299a1fe1be91111b192870d7197158d507a60d6a9704ba46f0243cc43e2d675203345843dc2ffd0c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xf, 0x4, 0x8, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r3, &(0x7f0000000100), 0x0}, 0x20) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000380)={'netdevsim0\x00', &(0x7f0000000340)=@ethtool_ringparam={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="200000006a0007c9"], 0x20}}, 0x0) r4 = io_uring_setup(0x7058, &(0x7f0000000040)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x18, 0x0, r0, 0x80, &(0x7f0000000380)=@nfc_llcp={0x27, r6, 0xffffffffffffffff, 0x4, 0x1, 0x9, "9c857e9a73049337c9b325862d3a3c1a846067849815597b04003b0ff2d023a26045cead2b60dfb543b31f6c3a3ab80916909e852db0d5ba19ffc1102c3b35", 0x29}, 0x0, 0x0, 0x0, {0x0, r5}}) r7 = io_uring_setup(0x34d, &(0x7f0000000300)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000004800)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000120a03000000000000000000030000030c00048008000240000000003c000000140a01040000000000000000050000010c0006400000000000000001080003400000000e0c0006400000000000000001080003400000000520000000080a03000000000000000000010000090900010073797a3100000000540000000c0a00000000000000000000000000000900020073797a32000000000900020073797a30000000000900010073797a30000000000900010073797a3100000000080004400000000208000440000000024c0000000c0a030000000000000000000100000a0900020073797a32000000000900010073797a30000000000900020073797a310000000008000440000000000900010073797a3000000000d83700000c0a010400000000000000000800000908000440000000010900020073797a3000000000280003801400008008000340000000000800034000000001100000800900090073797a320000000078370380100000800c0004400000000000000001600000805c000b80100001800b0001006f626a72656600003800018008000100666962002c000280080003400000000b08000240000000000800034000000011080001400000000c0800024000000000100001800b00010065787468647200006001008070000a800c00028008000180fffffffb5d000100d6c88064cf7352f78d2c03bfec472a3ae227c8c1aec828a18a00865d11fcd718ec03502f653e81c9aae56a901f15b8fe0f949488aeef5390bb23fe74aeefef016b05b8919af668a8838c60f510b8d71b4a1253d0d3fbce97df000000a800018042000100ec7fa8b3be93c1a855084f75276b248168e924e0f96f92c2b7710032ff62c6a6d2e4267e354d7a66f8f6f55358630b4090f60a8ed4f4cb42247860f94d7100004400028008000180fffffffd08000180fffffffc08000180fffffffe080003400000007f08000180000000000900020073797a31000000000900020073797a30000000001c000280080003400000800008000180fffffffc08000180fffffffc080003400000000134000b80100001800c0001006269747769736500200001800c000100636f756e74657200100002800c0001400000000000010001080003400000000014000080040007800900090073797a3200000000900500800400078004000780400001801400028008000340000000040800034000007fff280002800800034000006b4708000340000000030900020073797a320000000008000180fffffffcfc010a808e000100f5d4cc6c702def7d89505ebf6ee28f4a14f1248d57bf3d048e7b86fb74087397c688688c5f0f71fad4351f6b252020ef4a2dbb52dd2cc8f841ef8bdcd421a2ac8be71cb42a883fe053c75153eb553a2dd5c6d59497d05dbaa88b8ec2246ba73e0b2413cb7766e74d3f8d0252b89c6cbcd3d4783030220f1504780de063a2717cf767ce2f63ec6d2e437800002e0001007e7881bd49445bb4463d9f4e58d9e8c84455397b47d3b17f5a11ba5ca22411ce036ab0feb9b64a41c5f00000400002800900020073797a31000000000900020073797a3100000000080003400000000608000180fffffffc08000340ffffffff0900020073797a3100000000600002800900020073797a320000000008000180fffffffe08000340000000020800034000000004080003400000003f0900020073797a320000000008000180000000000900020073797a30000000000800034000000000080003408000000095000100ef7d2c1d1983fead1ebf24d9573b1a98a1de4080bf6b1935ebe19c461e2e79b28dcf13465ad31841e4bc8c86db7e8d84bbd959ff6aab0f242cf3904e1ac6e83a71ee19223e2f144387ba1ef39bbb62d5a4d5fd5c1b9d9aa9f27884732f17c20ef09e599eb052a174b4d325a99b12b27a8ef38c8d7aedc1832ea826bedbb6198b01f1a0c8cd289de2aba219b344cf9769470000000900090073797a3200000000fc02028020000280080003400000001f08000180000000000900020073797a3000000000bc0001001bef3fa470ae3bd58ba94a04dd56ab66c8954ade73ef9dc047880d17209d1dd6543392cc1c69036e2a9b86ecb9ffce308bdf2e30dbadf06dcdcfe34bc85bf595cbc98d0d9e0b22d34154097ad07e44317a9a565e02979a78754caa67a63e708147c5106c6e4bb0aeafe9a28549a10a28ae798ea4b25c6b0598d8a6bd6ab8018f4e15530d2365b80fdba6e35a4b5eb66e3ab633672c40f64e062756331397f2153e67edbdc08a28e45a7dee7144cc70c8694597d4c632f06f34000280080003408000000108000180ffffffff0900020073797a31000000000900020073797a320000000008000340084c32ca6c000280080003400000079c08000340000000010900020073797a32000000000900020073797a32000000000900020073797a3000000000080003400000004008000340000000040900020073797a30000000000900020073797a32000000000900020073797a300000000053000100a7d2fe8aa9ab5e1fad772663cb9271b8e9e068e2942a7d8be585c8df4231ee2ebbafea6f1e81c01c2c55a445cc82e53bd5961b6a9a6dc97dfea5bb1db03aef26218b4e0bf1af9b35c4b52943e9b31b000400010089000100761eedcafc8fbcf816988735c6988ada5c9e46cba5b0944a597a4db3461658ecee2e2fd609ccfd414a94fd8f68d00d8aeb9f411cd367e80d8dc3874ff1078bc972c8a1c80c97f7a129af038666f5a07e15a54382e4db799b6000fe1fc45c79ad1e38b88bef65ce71f7c711ab218d94043ae0904131deefd6a32b7b37ea3381fad4b9c828ba0000004000010008c8cef15c57920f55ebe44a1d3b8f8e02791254306d54064ef66a63b0a2e039d0bbfce86475007ea1c8853667660cc3c91009fbb3ebc799e8f219fd5800028008000340000000040800034000000002080003400000000108000180fffffffb080003400000008108000180000000020900020073797a32000000000900020073797a32000000000900020073797a32000000000900090073797a3100000000340001802e000100a8482fc3cfc6f71bed54c86d36f340437717aeeff97da015b27118b29918d0c085c35312259b2e0c5cc0000088130080dc000b80100001800c000100636f756e74657200100001800a0001006c696d69740000002000018008000100667764001400028008000140000000140800024000000009800001800c000100636f756e74657200700002800c00024000000000000000090c0002400000000000000ad20c000240000000000000007f0c00024000000000000000320c0001400000000028398eb00c000240000000000000007b0c00014000000000000000ba0c00024000000000000000800c00024000000000000000c11800018011000100666c6f775f6f66666c6f61640000000078120a803400028008000180ffffffff08000340000000010900020073797a320000000008000180fffffffe0900020073797a3200000000c00001007472c1c4b3c9309844f5c1a97179a8261a61cfc5239f9f95b365cbdcb50266b4e425e14e7c54c47a211603e136ab468bdb8592281348383b1d7f6a8db0f6341c01277e5c75e9371a6e6babc3e29af233aa7146f2398b54e1add02af045a40ec1f890ff049ea3cc012acdc2f63c94b1e0161dbefeefea3e3dea32ba78df76fb21ead82e01681d0637918dd6e0b4093eaf8ffbed7e3e54384e30dc75504291c3ea729d26d51d3abd602d56a65c165b90c1adb2caf44ca03eca6053a05b0e0001006405485f6be3424a5b7100008f000100ce9b5f85d6e59d8181af4f86ffb84cb9abf5a722fc31a5b6e0b201eee8d5329ac7b34ce205436307987c971d62bcc3b49f734607c61add044106476afd5c802236f5a065ecab79e291843be35d75e25ded5e82592cd61ca1294e3784cb47008c28f2830225591b6e5af0fc7792c164762071f36b35c9ebb4963999862fd146aa6fad1f45b02f365bc0733100340002800900020073797a31000000000900020073797a30000000000900020073797a32000000000900020073797a320000000060000280080003400000000408000180ffffffff08000340000001010900020073797a320000000008000340ffffff7808000180ffffffff08000180ffffffff08000180fffffffe0900020073797a31000000000900020073797a3000000000480002800900020073797a3100000000080003400000000808000340000000030900020073797a32000000000900020073797a300000000008000180fffffffc08000340000080000410010020b50d7a8af2622d92c9e20288d6abc16f4f26d0ff211e284a7537271dc66ae0db92b5467243c5bd1705526790ea709f0398e9eed9bb1bb7509e24c44c122c9c0e97e30582d441857e2048a7a8f7ecfc2c6f41834087f0f0f2d32842a343076e227750def524f70431edd93ea89446e7ac9382c8bc5ac23cf7460a93a10463ccd0a8db3e5f111269c3fa95884d2b486e2db6e82f5da5892937089a4bd39a8958698823eab4c7362d62dd954454563e3224702971470996877c1e2aa8af7c006e4da9e7d09e5059515c061d0f7b33460967ef6e410eaf9ed2fde70e3d7b318337799d1397be291757933636648c084a3e11b0fb51c5013a39cbc3a6e2395c162250f5f5329376fd630edf0c5b8f4733d3dcc0f4d8dbde93bdab1e2582d3923bb109cfba0913497c90b9a7ec75dba894053f61699be3f3c5750d9e040bb44a95664626941a938f9bceb83f86f9f6e7dae0e8f19c2769896cbe1c9c83056a5d965f4233365b6044c9f6375cd184c2c679fd0f8764fb58d7b67b40154a4f200681a46905bf58e55e8411737c1251932d2c5650d3cd355ace6c03653a8d57edc44cb96198ecb21b113bc2c3bd376b927e093778af3852200f87aa5e7a6bc8bb76df331557791e68a74bda2b5adb092a2ed0538511e7e2df26dea9a05978c3c5c14db5b95c2f9460aa36b0382db981497825212249e36f2227a959faa4e11b5ccdf22e12a24a34bd5c38b456b27a92e3a30a1b3d1f6879c9ee976fcf3d4423e39abf3803e0e470bc35fb04d0c8af7ed809a4bcbf69fc574a8928a9886ea4f9d29b7bf0c842f58e60cd7cf8580566c2fa007c4f9d188cb4719a871e4953211b62d578fa96f66c271acbb7fe87fe9f0bdb161e06af6903357c7f6d136c6f84ee4b2da6558fc5ced63f1e95ce80937dda3990a5853c53f498130016d5af98405f64c0c93aed33d950099b53ea23aee1354ed9c07829a31c2d3a0b022e96ecffdaae9aec2cafc88e2e771714b99738b8145d015e8bc6972035792ae4422135ed7d0d8dfaa0fb615047f4f18fa1a336e2c6ef0d307b6ba18c8c3ae9d46db8d2798d1bd3d08faa4633973758540b3790e936719b00179f3c13913d54e3b4d3815a2a0fe31158c425ef07ca233ff375ec4cc05729a327277222f21f5b07f9ecde062bb05c401e59d300ba8061e1bce0bfd231011cd98da1c394bb909b0748bcfee8a01e1022cd44934a1f2b6efe96fd56aeb16295a954ba8acf4705ad88621cad81729d16c727d56a73177ff91026ba59e45f97e033e6b6f960b2ca0493a26c849e3125cef6ecabd16e8828afcfce14359237463ea0b22c8a5b42d976597086a7b34c92e43903ac60fe7c710302398b6771c2a12897fcb413c3e6052d9255cee187d81adfa6c79186f00594fd3b58be338781aa39e34b74c997aa1660f4f5dc308dcf8a3bc792135854a79e76ab972af03d0b0b250a493ee29853a7be03b386a259a4ac50ce156e185a7c39892e0e0faf8a8458df379769ac08ce2ea8cce04dedb01182a5de5c835607839d560b4026a6604fa3d57e63673d4223e229bbdb60c2da2ffef44bec2febf85117c9505dfa3691cc43292c5fecad0c130dc2ddced34279914b22cdac359ffa8b7d01b2592acc2c5a7b42d38791d2c1bda1a7a399945e52b7fb12d1fb29ac87c18047fceba7d3479931a21d93043786df23b0cd19213650f40dbe3836a898b1750e9074e16f25b28f62b0ebe86caf967bfcde166fa90f55bcef487d27c183ea03059bfc13e84bbcc169c064e31b851f0405aad2eaf0ff92eb417474d17f4d19a0466a4b18a4be66dca94bb4f0352f858eb3a0a442842acbeca5f851ba11cc10106abc779aec3eb6b6a60adc95ad8f4ed3a71ecb4f44fd2c9712538033f9baf4fcc0bd496f1730b4a01eb2204afe10e3416c71c3c4129f347b22736428a99ad47a7b3635f26c49f84ccbff0bea28437d36a6fb7e24df5460a0b05581f184dcb5d6374cb653bb1f03d0baef4af51f58921ae785fa9f3730f7dcb6bc602d5a918d411f82648358678f53d3d5a072bfbd67185c878fb8ea907366aa536f62264e56b24e2146cb6fd0e7b38ab613f3c077dfb72396f3918ff19850a62ad8c152dfc715740d05d1c88d6fed9d222e33202136b407983d6998867ce18f5fac0fb5890e47b3d479e7208236d829e226a05cda90f316a0dad2bf570af9c1e24e605033acf792b5da2fa9f5ec6c143df406cdd5b3163efd11457c7417d1954dd26d1b9d94e2d0e3768a83cb7ed7d1f69ef4fc90650a5db5b326a0a5003edce54434a252b781b71809eeb450aa3fa02dbda20b42ed7c387feabc95c5eea49c99157a0283c0b7bfd4098dd369d9b97fe7edeb9e8caae37e032d04416c318576994bce4c26db2f70f3c5204598809ab2341fc76a9db46f6bdb5ec44533978e471fc1d05eb80f7fe1ade589ef7b5cb78fd6b25b10336264752cf01a0de96133d658624993bb035cb8d6ef1e5ebc4b149279b16993149d68bd17a69a2f1b456a006e1e57e0a8e3b6fc0484e53ce01fae83adf3b0473b6931f881ed9b1d717744976218cf390d4f9e848b8149f872e76caaaccbba10e7afa9d6a925833fffb2dcb49164b58ab8d9b9b13a11f99139358091f930eef33ba19a8da3ce668a15b6c04c46c81d421631ab74a9cd57e40681a98991d67a6428e16a215c5a8d18803c5038f2e7cf6f1b525838af1ad6fb4b7c95af792ec209515667d58b244e8b0001ec0cff1ae6a692896ba1c8734435f50c503896e34ade2f6747a133b8d8c07913a20e165dc9623f1730a6a1cdca0e3d7f628e5209ea13dbeeb57a60d1c4de501b0d0d11c83737c50999b12c7fab3a11ba1c22204d81a125d6eae1b275274f559902d0f2a60cfb2055bdeb219bff01bf6e183fa0e1de1548c03f3d8cbd6e75b046c901f20f1aff9eeeb7533e4c5d6b052501faaa56d94618c47235771d113b90c28d97826d1e9ad7fc23b6db7aee11aeec4ffee3c585d7c06ce051efa3a9800e1ac4e03d09e5770182546e068aeee9c1eee0a273e724f7d20a474b4f7b8daeee00428cd8f127ae101f7420fb8c048305ec508d2cf9b5a5233290554af5964b131c11e281e64a5f9d34274a4b15a71909d8d3e2aaf417770b9ce62054ee13e93533e9367dca869d95b11f60ab226c286bb9b3d0cbb9680b4fbb4fb0905e628ffde21cfba3cc0c6ed392ad8a84eda52eb8099af4fafd67c4e2a8879dde30c0176b9730b56eee99a87c5446dea7d3bbc0cff04b37f0ba10a9b08fc19849e6e032994eb53701703f9625c7a2ed2315ade9d267d6a0b44d204d620263e443595a46cc38fb595df3e9954a757d4925967bcd86a5540748ec00323840b93b5d75aa095618ecbe1d3ba62dba7769e5d6d4df89a0bc9e72d3ee5021e1337bd55ca1a85f60058542bb42203247708ed3cd9874ff965baaee5892020e5dbaf61d467ecb0335e1a1e2f1e2836d7edce4ca664386cf8093ae0b136fda850037c1cb18b29fbdcfca2419abc8362ea8b7118feeabd21a6adfbd7a0cf82eaf7f00d27bbb393aed65bbf1a6b89a29845da7f4ffca6759ae0c9291952a65d65dc53b6738afd279a52fa4169a0fe0a3f94e4d4950102265b624bcd0c699b8ccc90fc4f57a967f9434d372fe6194b91c50c1e136636513f41eb2fbdc0841eb841a84db4102bee7f4fd04df74e869ec85e556fcb38f64ef936b00e95a1ba6df950e6b345730be4ce5d166897547ae54e72188f52bdbd65c776a776e588c9ffb51eeeefab5f5a344498fd06abd9182edeeee109886b922ba0dad8561ff3098948939f6baa506f0ded404c124f22c5b762dda0a8171d197348f7aef84e085a876ba44da5f2ed36e10c495ea4574ec15f9e7dc0855a6c855079b60abb06d9800cfc00938f003600b7c5ac11aac6c956b34a63fcff321ce07bfbc3fd9b6491e9f6d404db7eefd3ef560b26ccb1d75137c74c57392ed86b34e56eb827d0287c08f2758ae96346e9e3e240c9be90df24d912056627a2e25a09c02a8ffee8742ca1bfcc46c0b1191c6c1c8a3f100cff780d54d5a57ad3266c6f06315ac079fd46ee5d0b0678ede9992c02407ff02319ec90a40871162b112ff03790cb5c1b2c06602befe98b14a8d75c1b78f10b92da659fdde9177b591e7d80b502e1cf7a70a71dea23b51f1737dca127c00dae580bb5c24812ad3ae7303ca9c6cac5baa162b3b195ca9651ac4bcce47423de592dc42fdc04fa474bb434404a84d9a645188b747db661bc80f832b0369fe67fc6630f228da21010779c7c3d1f97f7bf01cc59bc4286d4203fac510674dd3c3f1217b993a0123dbbe2a9bb963827c3033007929898357fac5ab53b89e65ee13bb4da21c3289c6550066a7c45c49113f767ba787ff45c0cfd5624daae0d9d7ef0dbae02dfb654481221300105b2e1b76af84926521e5abab1f93156a1598690945501d3ae34f88c9feb5d82ea9b426db2bbbd2f73882d70a97d6582ca87e97aee027c013551f1f0fbf79e7adf388b6d6420b9636e74581f91652f794a6bfff4e33fc6b8f745d6487914da403e1baa6e801c3409c623bb990950806a3c217813d13e4205ed990017d315a46a0932bbfacb554ea69e2f8123d926f7039e849f1dd6ace0f193935c9542b61963d4dbd77abec5d65618bbd635af8c21fcdb4b0cd843d150ff2f73b56474d846c97a89bdd4db376010141b1bb67b51d586f277446111a7874653f826a33021b511c0ea6014fbf6bba3a1d0149cf8df06908d0d8a3d25a23e73df333eb009ec9831cb2a09517c9c303ffcd68a5923811113e05bce08742cdfaa5e296aa1f3e0c19c8b96c84ec8748d8dec90ba837603323766dcec0c1c439ad208958d83984c5fbf9c9ab26969d676a8a2f52e48b1bd00bad6fbb2ca7d71203160c359fd9a648b8bd8509d5ac56d2d0da74440ecb1670e636c306c1a5ea326109a6a2c3cbf2471a05a73b2437fec5a58660988e992f7be7bb624bbacf65e3fb4466c18a89f32456484438770ed412d980f8dc701a469fdf6150cabd51916c19c2850ce736096cc5ea69205c282e54404a0b53e4bb6212403adeead9c3e08fb9fec190563022f9625d17750eab62a22fbc41a59e3343854654860c0dfdb5f05ee3153e03504955b43a014f5494ef1fbeac666076effa64d9ea6985638738455c3e00f04463bcd4ca75c182ec1388bbf78328399070ca91c4b82ea780403a29650a678f60a89e08f87fbf7e0d373c6cc0ac664927ae9cd270dcd3a09b33517d9565f074d3079f1be166dc8a32dc2c697724fcb7e1be6cbbb3cd56ee121bfd740db42afd0e0d80ee9e90ebe9e1ed61bd2a998c7dac5aa14b73c3843fea055ebed9faa57fa84e121629db441822fddbfc1ae389e8baa0dbebb8fc084487aa0a40a14ede5c640268eaa2c01bf6b2be14d1087bfe3e9c7c3e0f0f8802eb5d6f0d4eb21ada0cd11616a8b3d4669e978f18cbf89bf7d4cee99f93334aa60952797a71bc69f10afaca95dac39411fdb7f95b1b51e9a07998fb13682268ebcfd492a9fe11b6e7bca8c37366fb828647d316fd39469ef0bc57fa811444f2e90893068cfc213606936c938b1baed35e2ff63facf464820cb15fee990710c8586351675b24a9b3e0524ac6771fee227c69b765f6557c63ce95060b18b05ae723bd1274aa260f5abba6d71fca86846d3adbdb9963d552d7bfd3356f41a4640c5eacaba6260eddb3f264b631209d453c6faad6876dc849084c8a0bc31f1ec4999671c0f90fde12261928c161040001800c00054000000000000000040c00054000000000000000050c000440ffffffffffffffaa08000340000000007003008008000340000000000800034000000001680102807b000100831d18278b54f2b44662254069743b135ecf4e486674ddd7f688b0a167d9538c8847f802e6ea491d09cc780bd6b4a1da6c5f0ab3a5b638082e47ec7af3e3715b67f8b3f6a9bcb962dba4c7b019d27034df6b2dac2f0ad87ac00f01a8434d421218adf841871ad010145641452a510a58a8dff0f0ab5393001800028008000340000000030900020073797a30000000002c000280080003400000000308000180fffffffb08000180fffffffe08000180fffffffe0800034000010000040001002c00028008000340000001000900020073797a310000000008000180ffffffff0900020073797a32000000005e0001001b0f672cca1cabdb371d99f7ae2c811a0dad7a935bb7b817bbd9a82d421e49f98df69947172239acc6f3e4bc0ac722682da2d111aa658d2b0c35570a108e621a6eefdb169205efb177615678e6b7055199042329dbe28eb48988000014000280080003400000000708000340000000098e000640dc668131976588c781f378f3590a151165b52ee2ec3fa13f98d0b8ccbd1ab4ab25d3919f7cf5ee2af1f18439ab0c7bd724d60e24fc165d9752d8afcc00dfa3bd5f629de10bf9c70b284bec6bc60e15db88037c87dcd33f0bbd9a9c9647e08b73f2b3f5819570d57d8266fdcf832baa5a39e7a85d363ef71272e0beb5b519b1b4a10a9cdb08b25dc3a46200000c000540000000000000000530010280d300010002cce3fc3c4920748c44cd369a4a6416f9049e1ed6d7db547019ed3b2d280bb40fc109780ccd5503fac2ade745fd844335bf3a24d8dc4c72fc34a6ad7fd9f61e0d9d2022c948c72e257d9b42ecb826acb88ccfdb748c189ea929e60162368ffdaeb23abf3e83ea9eb1357ee2fd825a1a6c0e9315d9d1c6efc45080e0cbfda458e901a4fb71ee64f23e75daef268c89b6d98444c9f0694d0040f1aa309ba462fa20cb2526005f49803d07d7f2c01951b5b35493b0f8762d9342090eb729d2e3a30cfb6d6e51631d9a1b2a801d5a59dc000c00028008000340000007ff490001000b8e805551b82ed16e99bbaa740acd57cb41f3531e56f61e7626a35ec96f951b877771f0a8a89ee362d7c87dcc1cdf3701cdc338519723f53b9d789d931a9648fdd75c7c7800000004000780080003400000000110000a800c00028008000180000000000900090073797a320000000060020080ae0006401c5dfa65a040134388f33066c1cbeb472ffaef2c2845c5d5736c0476ce5bbbfda04b2b252c2c16732140e5061df9d5dee3fa3aed806e7c0693ade84fbb6a242de040bf91acdfb567d27d79f1557843e0ccaf39f693d71dfcb134278d61e5f878065a2640fc2289c4f03bd4dcafc5d96e977faac55b9665058280b7194b7d0869215df32994996d0c8c3831af0fead8cb60af0d199538651d441d2f648f794dcf8c68c1716b7774e970140000080003400000000054010a802000028008000180fffffffd08000180fffffffd0900020073797a3200000000c100010003766d164540a336bf04daaf775fec1195ebcf48245aed36b3cc3039c6185fdc32dce59fe7f7305909f714bef4efb04169eb2a2fd5f5151e75f3a5f30a4466c1105fa5de321a5fcf85d6dbb927755805a33cea4f3ee141c108719008a3439ed06e5aec663a4cfd8d580252a0835ebcf058fb1e8f9fcfdc7417753805661998666c4939af90dc5f96179b7e5e4442023e37a54511dc3a341ec63f9764db7688b541ac0ab69f9dc101c4a10045b93a952402af5d3a607771e4a957c157f80000004800028008000340000000010900020073797a31000000000800018000000000080001800000000008000180ffffffff0900020073797a31000000000900020073797a32000000002400028008000180fffffffb080001800000000008000180ffffffff08000340000000010900090073797a32000000000400078040000b80100001800b00010074756e6e656c0000100001800b00010072656a65637400000c0001800800010064757000100001800b0001006c6f6f6b75700000c802008084000a803a000100479387d38a711739844ca4dc132b9bc531a749c737b7e81ba751448bf8a54ea4d4d75b9dd042d53d48e321c313fe07ac5d7c38840cc6000043000100312f677d6a1a84483fabec21fb950426a1ade26ec27ed7df82c81fbe76de28b47582a4712c63ce0d60c19f147bee38394f3f9289b880b0b476e7dbaa33e06100d4000b805800018007000100637400004c00028008000440000000020800044000000014080004400000001505000300000000000500030001000000080001400000000b08000240bca5cb4d080004400000000e080004400000000a140001800e000100636f6e6e6c696d6974000000200001800d00010073796e70726f7879000000000c000280060001400007000010000180090001007866726d00000000340001800a00010071756575650000002400028006000340000300000600034000020000060002401000000006000240008000000c000540000000000000010064000280600002800900020073797a310000000008000180fffffffd0800018000000000080003400000000408000340000005250900020073797a32000000000900020073797a320000000008000180ffffffff080003400000000908000180fffffffdfc000280f5000100c97a4370852606c51343092c63307f227f9712c8e673637964c6616d606be738bebdc0922e39747b54afc120e031d549569e1b3ca31f90d43ea4c1f4f5d8270b01dfec778e1d2d1e3e8a9835c7297fa8bbd9f1c75b645b34bdec0cbc380921203f1ab7e2dfc0a2dc0317114beef2c07d302d6e9b2694c9668d1d5a8a559310616fca87a306f44054fb21870d1c6af24eb07bf3086d8a9897823980904a140cc0441a980a68e4c8d7e8b2bf89549f90ac772f73656c650bb3e4537c87372280a1cace7aebcf92d539751ec5038c55f773c3a285368af372539a5b6903ed58b57fbc3ba51ccea768e64871cd69d6a2710921000000e01300800c000440000000000000800088000180280002800900020073797a32000000000900020073797a31000000000900020073797a30000000005c00028008000180fffffffc0900020073797a320000000008000180fffffffd08000340fffff62408000180ffffffff08000340000000040900020073797a30000000000900020073797a30000000000900020073797a31000000003c130b803c0001800b00010072656a65637400002c000280080001400000000208000140000000010500020000000000050002005b0000000500020004000000c41201800e000100696d6d656469617465000000b0120280b40002801800028008000340000000030900020073797a320000000018000100c63d3519ad4b25dc55891ed2c786c5756af3eb2f100002800900020073797a3000000000280002800900020073797a32000000000900020073797a32000000000900020073797a30000000003000010054f376e00a21fb73d60eb75d7ffd2a01af20b4023b881f0d48580bcca2943895023a530bfc9b8051f397d50d1400028008000340000000090800034000000000040002800800014000000015f0110280c5000100e6de8c8ccab51a098d7af866f31dd72561584dc636d4bc0a54b9256c50dc4bd1b63d9ebe2e8b344eb2faa226b19ba8f2943a5e642291740b7440a072c454ea4dbe2402b936970e06ec078fc54cf2d253ecc1cdd98082b83856b6579b2f7755e8025a0767ce9d7e19cfa8b38155f5fd66d50ae7565d919ab49aa8b16a19fa91f66aa4b5d4dfee42e2a6795c1c1ad6d6dabd72d3d928712c0f5cd822b54f368a024c030d04dd31b2ee7e7ef9173a56e317006bee2c0e08033da536695ec18b204d3d000000b80001009474318972aaa0ae122786b771260ece7859180e89f077c4b7395b4361c8f8c487f46960792b97a298998336571887768da733c0fc68d8e1b8b54c9119ca8d3ac47d7e489b184131fdc083061ac0300a5a31ba1f7ee72cf8a717901040f0ce07e6eca522126f95d75d8987a0a6372ca82e642dd2f863c7b6c113099bec383b5e4d6fe447f21b8cc443faf8f72412efd66740f08047aba8d9e7302dd19bd0769368315fd5b5c4819680bedb162f23b989174f96ef360001000bf3044f14571a342b3b310b10199bbc80bbbc0ea736887d77ed27e36ce4ab3008d52772233d493130de19627d60f343586e00002c00028008000180ffffffff08000180fffffffc08000180fffffffc08000180fffffffd08000340000003ff04100100d0addb7b343dc2f0c18faa9cff7e747c5eae76836d7bed6eb255bc703fe698163549bb1b7aaeefc6b80767a8619a3dca62173eafc36b5e652d559fcfdac3ceb4ee6497b2dd670643797904354bf3b57711f8be367c620d858af238cffae54afd9876d31bf7435fbe1a315ab7234eaa218785c1d92df863e13856736583ce3b3f7df4086f8d81e72256cb26910f534dbd5d9a45bb57083c11f1bca1039a7b60b291701596c41fcc5bd49d0085f65ed7c0be39f1531dad22900d3d3a1ab6c0d06cfde255a92b5b940089cc0e91b766634e4bbf3dedcd53e5f79a4a1ec3f1c7e64105cd656f86742642558c759d057d33f91dc056d6099a664dc458d325bff0500d15d2e3597549a6f7afa84e894f4695d7c9d58a0d2d23bc40e9d9ca007f177fdf6b8abc7f87ab2123d7101647918d24c3d920abf1d00f22214f2bb2075774c1c382d43e4c7e3bc47673b746169391fd29f74f2d8f77655b70a3f2a59cd8e48d38ad691146ad0a0a4145865b11b1b39b968fb2416156bcc1de06b54a9be8210f2e28a245f1e488291e00b63e9f5d2ae5cb50bde4d677736d8d44693bbb696cddd55d03d17163866c69e3e91f68ba5b8e6a4d7ea950f4118fb0a2c7b98c493959d0b7e34ce12984ee131055e9e3f39ef1fe3d98b2cc3d948df3d63e908f2737243e657ae2f676e4a27be6023ca78f68faf134091c79c7a0a8527d869886b7a03ab3b5dacffd0d9217dd3beb3c40096a2159e23c450697bf7bd6d5c90acbe9438aed451823c4227b098409b7cd2c11b634f6e749767c0a214e437f7a839d10e6f5103ac2e862b0a3765eda9e13c79bf2b6bb7e6a1d78969ec9b774c57d8a5f674dced6d3cb61cd39551dff4e8fa41a4c61ebe723ec7fc29a78bc9602f79af849c9d0df4bcdbc0f468379e56e5eac3625eb72456752085d43ee5774a08618632cded330e770c23e7eb6e607499e87ae1ee3efce1c3a4ed3710cf65c1cb91a4e055927e02199a09454d0a9e2fd7edcdbf45be15578bd7ad98d66266983ba6cb12fde6ef245083f4d25b6e4bffcd0a0e374f582d8aa363affb2f594378805d623f01b8b614a9fe19994fc7df07d0b8ee48f60f8eda62decab2f22241a7506f300dad61e3b38e671622cbf04a2e45ac1314d92d5ac8305f0170873a4ce287abef4f7f739c34cb8fcf03163a4d0f518881b44e012d09199f1fc16f13ab7adc3d2b8ebffcc8e62c492c13c95795fc34fcdd1f43f17a361e1f98589793ff6ca4f0ebb9a2ccc76a4a2732ae3bd50ccac4a88271c0da3f08b3c9dcb3268d3a49776b521f7e96d4684b4d04421ba610fbbb619aa6055d6235d77e72899ee5ad9ace6766b3c579158df63e858ddb2527db72d6bcde99be8d92183f05d5532d75e2d9967fdea2283839b6aa20303ab67dda723189696fa2e2cd71c80b3bbb3fb4dfab7390cc0495286aa1b99c16b1cd97e57f1c031b15a69090a9b94f329459f45a90a55c73e5f17dc3a8757719942327a0359fa91f2d814b7ee052405ef209543337382f9568cf7508f7a7cd5ba8359a60bd00a26eee92b43e0c6809d9983e02a687cd02955f795ed9f8ea68414f42c26f4edcc3cd945e208d4685c523d136b426a8e38105ce1852fc72504758f0e83f6c3f661c5f0901415ec20ad9479263dcb504a5a6f1c2d4865d8eeed4142904271b85f11a8d8b368d763fc4b6e0ed92f278c451681f82f2caaefbf44207db6eea8685000c3cc273eb4445f2583d19a4954745225b597ba7b33a7dd9237e0cf1845bcdacf8ce95d68ebd5a4c7e5f15a1f0864c08744756a2b169c9a5bfe69a1ba45eb816658f0af176fc0f9ef0bcd6278f538713fc58ad93b8ba3ab30e8c3d2279cc486e64a231fb59099b561e5d8c0acb6346f0a296f60cb5ac02e5249bcd3df9213d357f6eed864a186c9792fcb4fbbe1ace1f3fa41794b75e2c15f149917735e36f7615f894ee53c1a8b3ad6a6390fa22ce7eea713f8801bef45ca881141b64f9d2cbf86a2318e0835b83d0ce833ddab7181ea59bc295460cee811def81df733e3d9659f502ffdd9ffcaeb04327c48f0358a18fda8a441ca9cf6be87048739f27659170ac00fd28d8be945ce99bdadb8f8770c9bf0999ee257b88908402167f69efd7a42c33aab077044a9c59fb474afbb72fbc77556a3ec9fa6e9e99f5269dabe7e6ae89a4b8e898d83c2f4ecc37b662b62eda3b08107f7d2a952cdbe1fdf3022a33e296173b25d0e9309851b9a3155362b83d06da6a351fa3bb86490409e54da4c06a1249e8da37740e10dfcb720da4a4de01740415e0fbd208ae54ba4cd12d26c12a555ab83561177b48859385c1c688cbf9fbfa12a1fc472fdd319d8b312fb2679e17f27b06f20134bb9a8a785e9c31f25151299811d82b18df88f42d9e87b7ba8d842e76c34274e85ab62d94860afb302ba97e51c9c68a54efff95fa33cde02c7f1428bad1532f849fb9b70c9a380af6a73ec463f9ab38f5ed4dc1cb370ae593cfc2b04af8a03044d032f7eedb740f96c966f0ba084f55e85eb55e2262c0fcc1bd37ade2d07e9ea14f7c2ce7af520d5ff6317c6f67e48d1a340abda6ce4b72c26bacbef364c57f82c2367077354834858d6e3dca65a3ba1cbea5533dfee2f06b76c2ed59279f5c121a9beb048021461917b0c4fb42a3dd23e4aafb6fc0c5cb0a5d1c758b01f09ac2b5747c49a058412319d7e913626024160775b81d521a24ed6e2bf7531c3d42657d593c68fe782064fe8414b81709d735c078d883a98bd1b1614ed773b08e6fce058474a2485c96f76ea528d5d4ff587631ec2d5377e5711138c087c223728a27cf5380802d024cda9dae9c3a69c5bfd805a3d52c067d03f360ca57a4e7452f09b4708b9c724f299b2f92680657d7214e3462026b2d090a598bcc66ce59f4fe062b8689ed25bb727cac378bca8c9fea872197efbc1f14f38dfc072ea5481678d9f3dfd5893645bc4c7175469d28d05e1006c45cefd1251fd8a1b108ee3179ee4666a9ecae39b612acd2dc3d1c2321fdeaac0fc288b07807f492bc79ad842adffc72b0e2b1d276f49545553cf5083c85b7ae97727f5bca9c33b921131ee44ba0bc77c128dd60b4c261f448962c62bff8d8ae815321a693489a77387cfeef9b17e8159bfad6284e59d3257554c86f82871e12cfd145cf7f1dc14cc95d5e46fc7aa10bd571ff2a00b17b0d22d329ce7aa257695ceec1bfdf69dae29029a32c7b0a6b72902c23c8386f65548a62797d126dfe82a89e1a243a09a72f4e092b48dccf8bf451f68876184935f2fa2e3094d459ee05c180bdbb05e7e190c4f25d2dac247a30e89489f41a1b9accb06b2840711c6627c59b0c941be98c1f31c03f3d59253e430eb32863e0bbd94f927b113d97524d0bb4cc4f7f3687cfe480bf1d9ab1d34d66c8f761eacdc80e361f1bd182114513f72067b0fd55395041f44891ba77bf47fe1f0ea7b780502991f6fb88b29e585f51cb0f17b051203934d191bdcbbed203649995d342fcbc504b3c33cf92bcbf0c9310fbbbabf358b6ffaaf066b90a553c929f1971ae109237a935dcbfbe6b027216b3e2c4095efe1f970475ef6710d02fb0a5b5dd49e044686f075840ad03a0cad44b23c5bf99e9d0a43bfe22f7dcd06383075ad676cb21685c4823ee2aa143017821b57e7de73971f68acc51b32f0c19319641adbff7d085903d0f5c12dd743a2e16049af7081d7c651465526d6f8ac0d6a3621d4bbda7091e773828166ea769905579d0317e3a37a5b660c5162b9d8dd385a1f20ae1b32407604b4bad7548f4d556850686de5bc41554b453f80afb48f3ccb99e06b9a1aad5888161721897c61c5b0eefccc768f1ea9ae53cf2a0e4bef94e7938ddd30df31561fdb4dfc9a97e132712565b5af15f1cc4e9b7ea72b921bd85c2de3290889e0c2c9008a34eb1f3d4050e654c4a445b58bc44b0fb6f177a334f814388cbc0f2582d30d8af6fe98ea113c75c70827abba0dbf637dbb4fbc666df214c14097d1f4609046db58efaf333645d2a45948c7e31a9a66ada95424ed6ea10ef7f2f623694c9b48acc558665661057f18d29d2c315b9d03bd71d38e6ca4a49ccd3666d71f6d78dd264cb6e0d7964cd96575564c65727a270f4e5eaabbb86edeff88aa43d31d3e705a96009934f54435d07e2d343e8f9bd68e7d1ef79ed79d08920a2691884807d04d50461130e8ec94db9e045b0dc95c7cecaa746dad4df8372d088a0a89455bc12c454edf073c58de87f5592e283d47f8876a31710470a98fd141359276e28a67bd92f96a0522536c0337bf0da8254ce5a806286a012e2bcb5f59c63d6424435075f43be7945325741a4b90505c3f9eafc9771634e1846f70a592ce2c5f7e4ab98f49ab18ed7628acd3f6cc06cba467fbd680acb8d824ce60b3ae7cc35a40e5964c5dd176902c9be2a3e6d4ef93b1ab91b9b9c75370b2bfd91d1c19231ca7e0a7d3f87e81d31ee1ff966cd4711adf4fa85bf453ef114c44b445188bdb11e7b15cd1237f752cd70f55bd7220caac7fe259a24b5793b2991020354e8787370f855d0466c0c0d9ff204d7913e1ede2ce9d2ea745fd537c670ac150b60e9642804bdde2d6200d7304ebfb4e11ac0465f052ac23e61d2c17615c798da2279aa52df102cfdbfa7fc66dc111fdb6fd76e7c228cae76c4788a6d0bc33d79d526c65313c640631838a2fb21d2898d5e9e5e71277137a84402b7b7be7b2514a2bc2a77c1bebab640ef86753a9d42654a8bff8ae1ac860badbc7f14aa30cd5dc80acc995a4f130c1a0e9f8280b232457f3324e1f8cf54c3ed575aa8941d46f60f6fa7266be3588b851b264ac2886e245c8d431db0b5d6322b4e4eec533a3402d3dc8d2aa252a004aa38626561ee90e8ddf6ff5ab4e5e0626486ce4cee50748b3968a1647c78e1ffab1aef5b81828f3d37ab9e3d41243cfd7f52d657d9bee84dfea015a5babc47a5e26d4eac9406f37a6037308bca85b2c4081dbc6e1e3ea84f9547f22a360ac42237f52215c972cf8bad6662a40048080eed399566476531c244786beef92751a2d7e7771936597d2dcf86036c2ad280e7b9f30d727e94a3022df732a42d3a458c9634768d3596ea8ab7853ffef74a356dcd5136810e37a155be61ea28315d75b5a25e1ea44b6a74395ea28d2167a4df8592ca11724f46a7deb945757926f02ea872569c9d0fd5b1fffb05239101688ad9eed3336d31dcd19b17128527b959aa60f3ba15a177107990c34096c39a6fbaaac037cabf4b6d1978a513aafdb419bbcd79cd8997fb189ee1ca32a3bc2d98148e64d2261b49236450df79660c37ce53b4e59c94c477c315a585105e0a90307b9ce4e37212e7d8588c281145bb9197a7fabb6aeb3d636a15da4c301ff04fd02f89ab732eb327ccd7a7f420e75af9e08e740afad9877b2ef67fd112a545c1e3aba1881fadf7c55b54ee0723be1829f8fff2e891235c223385bdc2745637deef68a75f57ba9c44ce611cf451d81f0f1447e505b9c802a22e03113d2cee1ca4dfc43a2e3ccb1a6788e44950150590e7a817f7be35c54344c8c4066d07b6acea5ea862ab3a0e5b0834fa54ac157cf55fbc2ecbc965487dfa84421c1716ad66c44f65582d62cecfe2347e419b9fd9f112bd6bd4b96fba5b617db298bbda0593cd08ed9924d4762da5420e9e4161591faf861399a99b2cf893b757b0ee128726b21e008ef32488e7feabd5f982123b005d303515d55748d3f188b13673276c0aa181fa0c7179b7d99dd7e54f42eda48c6931cfc040002803800018008000100667764002c000280080001400000000f080003400000000a0800024000000001080003400000000a080002400000000f0c00044000000000000001040900020073797a3200000000040003803c000000060a02020000000000000000000000020c0003400000000000000003080009400000000208000940000000010900010073797a3100000000140000001100010000000000000000000000000aa40706c7ef44918d5f008784c993a18e5c56017eb054d900694411af1664a2e1520245d5f73da0b01a2e22cb9bf81e699c2248db034acca9617d3ba07d988b98e85f6d2ebb39a6b95ca765bf8f2057df148807da67e6170d9a42a5744fdc66b03410035c76872ebd252aba0b4cf4b15b4ee6c622cbd13cb349540e6ac4e3f6ab1ffc8e57"], 0x3958}, 0x1, 0x0, 0x0, 0x8810}, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r7, 0x18, 0x20000007, r8) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000600), 0x3fffff) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xa, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b5090c00020000007b9af0ff00000000b509020000000000c39a00fe41000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018290000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf980000000000005e080000020000008500000307000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 52.909585][ T4848] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.918319][ T4848] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:54:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002080), 0x101000, 0x0) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x85, &(0x7f0000000000)={r12, @in={{0x2, 0x0, @empty}}}, 0x90) [ 52.956497][ T5122] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) [ 53.002314][ T5124] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 53.017117][ T4890] veth0_vlan: entered promiscuous mode [ 53.032254][ T4890] veth1_vlan: entered promiscuous mode 04:54:42 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@grpid}, {@abort}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r5, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r5, r4, 0x0, 0x0) [ 53.054665][ T4890] veth0_macvtap: entered promiscuous mode [ 53.075379][ T4890] veth1_macvtap: entered promiscuous mode [ 53.095380][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 53.105894][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.115727][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 53.126304][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.136185][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 53.146659][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.156691][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 53.167162][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.182244][ T4890] batman_adv: batadv0: Interface activated: batadv_slave_0 04:54:42 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 53.199711][ T5133] loop1: detected capacity change from 0 to 512 [ 53.264900][ T5133] EXT4-fs (loop1): blocks per group (95) and clusters per group (32768) inconsistent [ 53.304988][ T5135] loop4: detected capacity change from 0 to 512 [ 53.311363][ T5135] EXT4-fs: Ignoring removed mblk_io_submit option [ 53.346166][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 53.356684][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.366580][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 53.377058][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.387016][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 53.397501][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.407920][ T4890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 53.418674][ T4890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 53.488032][ T5135] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 53.694264][ T5135] EXT4-fs (loop4): 1 truncate cleaned up [ 53.808830][ T4890] batman_adv: batadv0: Interface activated: batadv_slave_1 04:54:43 executing program 2: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x2}}, 0x20) 04:54:43 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200e0093203bcbf927a87d564603df1e5537b446ba8c5b6b6b76749e4a52b70206209e54c3c1cc1435894c02f45223377ecc8f4c5b663efa1679bee8026b87233f803f01362133358708f253ada66ca16025c6407d255c716f28c39d068db6217dd7fb730694543186b25248b06f334e750f0914f1195c140dee0c0c4c8e206c03513da84a5c53e12f66c49e1eee661"], 0x20000) syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000300)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000080)=@ipv6_newroute={0x24, 0x18, 0x10b, 0x0, 0x0, {}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "0400b363"}]}, 0x24}}, 0x0) [ 53.852400][ T4890] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.861303][ T4890] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.870040][ T4890] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.878807][ T4890] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:54:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) sendto$inet(r4, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r6 = socket$inet(0xa, 0x801, 0x84) connect$inet(r6, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r6, 0x8) r7 = accept4(r6, 0x0, 0x0, 0x0) sendto$inet(r7, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r7, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r8, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:43 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x227a, 0x300000000000000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="410023010000340200000200000008000100", @ANYRES32=r1, @ANYBLOB], 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000680)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0x2b, "3c3beec96792c694d9e1848bbac64cf3ad6b17b6434a0d2fa65bca431be3abac9041d3310baf4e47f5ace9"}}}, 0x3f) read$nci(r0, &(0x7f0000000380)=""/98, 0x62) write$nci(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="41759100"], 0x4) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x80a, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'wg2\x00', 0x4801}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) sendmsg$NFC_CMD_START_POLL(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100023010000340200000600000008000100", @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) 04:54:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=@updpolicy={0x1fc, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, [@tmpl={0x144, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x6c}, 0x0, @in=@local}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@local, 0x0, 0x1}, {{@in=@empty, 0x0, 0x6c}, 0x0, @in=@loopback}, {{@in6=@private2, 0x0, 0x3c}, 0x0, @in=@private}, {{@in6=@private2, 0x0, 0x6c}, 0x0, @in=@local}]}]}, 0x1fc}}, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b700000003000000bfa30000000000000703000030feffff620af0fff8ffffff71a4f0ff0000000026040000000000003d030000000000006504000001ed000079110000000000006c440000000000007a0ab0fe000000007913000000000000b5000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af05000000f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a715bc5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128c4e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c26f71b29ee35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d0800af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8ea8fcb913466aaa7f6d150352e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d390dd65be2467b373eafd9aa58f2077184b6a89adaf17b0a6041bdef728d236619074d6ebdf098bc908f523d228a40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e52915ec0ae563f721c5363092adaa1d8964162a27afea62d84f3a10746443d64364f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b93d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d710b651f898ba749e40bc6980fe78683ac5c0c31030699ddd71063be9261b2e1aab1675b34a220488c126aeef5f510a8f1aded94a129e4aec6ffc3a15d96c2ea3e2e04cfe0e669e51731b2875353193f82ade69d0540059fe6c7fe7cd86975023cb08cc7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed82641687f3b3a70bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c5538a294270a1ad10c80fef7c24c87afce829ba0f85da6d888f18ea40ab959f6074ab2a4009b9e5f07ab513cdc6c0e57fb1c1ca571380d7b4ead35a655e0b4a26b702396df7e0cbe02b6e4114f244a9bf93f05beb72f0861f75c345edcb84ac7eeedcf2ba1a9508f9d6aba5823a34a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a9b702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b728fe26e37037f27f277b8a8346962a350845ffa0d829e4f79adc287906943408e6df3adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d0a874c74b777df005c55fc30511d00000000c85265b2bd83d64a532869d708000000000000007baa5b6a682b50f0937f778af083e055f6138a757ebd0ed91114a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283c42efc54fa84323a56edbd287eba0af35c35d91f3c62a0ca74836a640224de85f2b4a5fee500bbc584328a6a7a4628c4378c9b71dff64075b74a6520adb187b40d2cccbcb08c0634ee74658d3e23bf511c8b0bf1b69d2b3782b3f481c320e7bd4615dbbf24c06ac95bd639e68d0e6aa7f0d07bf69a93365f803f0144af37236ea133c2255b0613bf8ba1d538e06c2411e8d70053b712084fd0e313de9bb19266e49a3a2190cb039c6f89610acd896319b9c8d1b8aac2eaa5a4f8be7419a09e3fb5be3be2fcdadd2299839cc40e684e6e2b4e1385fde7a0bad3b0be672110268a34dad364fddee69e564119cebb6940c6356ff83ca527c573d700000000000000c6299263e6d9097f225de969485bce3d7dc471c0669bb6a467cf0de54dfcc1857048fe22a19dbb1b3cb9babaa839f1f6e817a62d95a5b971ff96a5c66c338c6f2a2da4644519f40761402e9c81013d76c7152c95ba5efa24ce1930f23a2277f057ffb6b0144f3b434a2adc456ef4d2fbdf7c6238c2bb00ffcf2d23d68cb9b027f3b225ec4e09b089f7956b66c5692b46ea03abb6a404c8ccceaa4ba4161409fcb54b86eaca26b2a0c4b81f7b71cbfcef00"/1724], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) 04:54:43 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x3e0, 0x210, 0xe0, 0x100, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x100}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "85f504936d148efab2c4d5c075fe1d83e000740fe870f3a9ee13d928ed00"}}, {{@arp={@dev, @dev, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_batadv\x00', 'bridge0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @multicast2, @loopback}}}, {{@arp={@loopback, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg1\x00', 'vlan0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x430) keyctl$set_reqkey_keyring(0xe, 0x1) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000000c0)=0x1) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000100)=""/67, 0x43}], 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) write$sndseq(r2, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000080), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00'}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x891d, &(0x7f0000000140)='lo:\x96o8t\xd0\xe2-\xf1\xf1\xad\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\a\x00\b\x00\x00\xdb\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcb\xb8\xea8Uw\x92`\"2\x81d\xdfUx\x89\xc50x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) socket$can_j1939(0x1d, 0x2, 0x7) (async) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) (async) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000100), 0xfecc) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8}]}, {0xfffffffffffffd70}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x275a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r6 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r6, 0x11b, 0x2, 0x0, &(0x7f0000000000)) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) (async) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) [ 54.086355][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 54.086370][ T28] audit: type=1326 audit(1713243283.436:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.116490][ T28] audit: type=1326 audit(1713243283.436:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.140588][ T28] audit: type=1326 audit(1713243283.436:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=6 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.164340][ T28] audit: type=1326 audit(1713243283.436:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.175199][ T5168] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 54.188273][ T28] audit: type=1326 audit(1713243283.436:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.188296][ T28] audit: type=1326 audit(1713243283.436:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.197647][ T5168] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 54.221446][ T28] audit: type=1326 audit(1713243283.436:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 04:54:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0xee0000b0}], 0x1, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) [ 54.278695][ T28] audit: type=1326 audit(1713243283.436:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.303581][ T28] audit: type=1326 audit(1713243283.436:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.334889][ T3733] nci: nci_rsp_packet: unknown rsp opcode 0x135 [ 54.348136][ T5183] syzkaller0: entered promiscuous mode [ 54.353643][ T5183] syzkaller0: entered allmulticast mode [ 54.373891][ T5185] syzkaller1: entered promiscuous mode [ 54.379449][ T5185] syzkaller1: entered allmulticast mode 04:54:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) [ 54.389523][ T28] audit: type=1326 audit(1713243283.466:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5160 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10d1c7eea9 code=0x7ffc0000 [ 54.493227][ T3733] ------------[ cut here ]------------ [ 54.498739][ T3733] WARNING: CPU: 0 PID: 3733 at kernel/kcov.c:860 kcov_remote_start+0x326/0x380 [ 54.507769][ T3733] Modules linked in: [ 54.511722][ T3733] CPU: 0 PID: 3733 Comm: kworker/u8:8 Not tainted 6.9.0-rc4-syzkaller-00031-g96fca68c4fbf #0 [ 54.521885][ T3733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 54.531970][ T3733] Workqueue: nfc2_nci_rx_wq nci_rx_work [ 54.537529][ T3733] RIP: 0010:kcov_remote_start+0x326/0x380 [ 54.543343][ T3733] Code: b0 f1 28 00 4c 89 f7 e8 18 5f 2a 00 e9 21 fd ff ff 0f 8d 1b fd ff ff 4c 89 f7 be 03 00 00 00 e8 90 5d 89 00 e9 09 fd ff ff 90 <0f> 0b 90 65 48 8b 05 5f 9d d2 7e 41 f7 c4 00 02 00 00 0f 84 f0 fc [ 54.563096][ T3733] RSP: 0018:ffffc9000138bce8 EFLAGS: 00010002 [ 54.569212][ T3733] RAX: 0000000080000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 54.577206][ T3733] RDX: 000000000000029c RSI: 0000000000000002 RDI: 0000000000000002 [ 54.585191][ T3733] RBP: 0000000000000002 R08: ffffffff84df8a12 R09: 0000000000000000 [ 54.593175][ T3733] R10: 0001ffffffffffff R11: 0001c9000138bcc8 R12: 0000000000000246 [ 54.601158][ T3733] R13: ffff888107b34800 R14: ffff888107b348d0 R15: ffff888119fe9080 [ 54.609138][ T3733] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 54.618081][ T3733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.624721][ T3733] CR2: 00007f7bf1bb8d58 CR3: 00000001195bc000 CR4: 00000000003506f0 [ 54.632697][ T3733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 54.640664][ T3733] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 54.648640][ T3733] Call Trace: [ 54.652008][ T3733] [ 54.655029][ T3733] ? __warn+0x13c/0x350 [ 54.659219][ T3733] ? report_bug+0x315/0x420 [ 54.663737][ T3733] ? kcov_remote_start+0x326/0x380 [ 54.668964][ T3733] ? handle_bug+0x3e/0x70 [ 54.673298][ T3733] ? exc_invalid_op+0x1a/0x50 [ 54.678155][ T3733] ? asm_exc_invalid_op+0x1a/0x20 [ 54.683289][ T3733] ? nci_rx_work+0x62/0x230 [ 54.687794][ T3733] ? kcov_remote_start+0x326/0x380 [ 54.692987][ T3733] ? skb_dequeue+0xb7/0xd0 [ 54.697480][ T3733] nci_rx_work+0x7a/0x230 [ 54.701860][ T3733] process_scheduled_works+0x465/0x990 [ 54.707380][ T3733] worker_thread+0x526/0x730 [ 54.712020][ T3733] ? __pfx_worker_thread+0x10/0x10 [ 54.717226][ T3733] kthread+0x1d1/0x210 [ 54.721381][ T3733] ? __pfx_kthread+0x10/0x10 [ 54.725976][ T3733] ret_from_fork+0x4b/0x60 [ 54.730400][ T3733] ? __pfx_kthread+0x10/0x10 [ 54.735061][ T3733] ret_from_fork_asm+0x1a/0x30 [ 54.739834][ T3733] [ 54.742849][ T3733] ---[ end trace 0000000000000000 ]--- 04:54:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) sendto$inet(r4, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r6 = socket$inet(0xa, 0x801, 0x84) connect$inet(r6, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r6, 0x8) r7 = accept4(r6, 0x0, 0x0, 0x0) sendto$inet(r7, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r7, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r8, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:44 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") 04:54:44 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000180)={&(0x7f0000000b40)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}]}, 0x34}}, 0x0) [ 54.826629][ T5153] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 54.866427][ T5194] loop3: detected capacity change from 0 to 512 04:54:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r8 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3, 0x1, 0x2}}, 0x20) [ 54.876407][ T5194] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 54.885560][ T5194] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 54.908782][ T5197] loop0: detected capacity change from 0 to 512 04:54:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffdb1, 0x0, 0x0, 0x0, 0x3}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x0, 0x0, 0x0) 04:54:44 executing program 2: r0 = open(0x0, 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) [ 54.919510][ T5197] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 54.941074][ T5194] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 54.950169][ T5194] System zones: 0-2, 18-18, 34-34 [ 54.955827][ T5197] EXT4-fs (loop0): 1 truncate cleaned up 04:54:44 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 54.966393][ T5194] EXT4-fs warning (device loop3): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 54.970966][ T5197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5197 comm=syz-executor.0 [ 54.981308][ T5194] EXT4-fs (loop3): 1 truncate cleaned up [ 55.011763][ T5197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5197 comm=syz-executor.0 04:54:44 executing program 1: setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000002c0)={0x2, [0x9, 0x4]}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) 04:54:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "b104a0f582a46865", "3e284780afdd545a8c81d3aed9f6a326", "251ba274", "5e511aef81d12e71"}, 0x28) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x149800, 0x0) ppoll(&(0x7f00000000c0)=[{r1}, {r1}], 0x2, 0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="b0000000020901020040000000000000010000090900010073797a3100000000900002000c000280050001002f00000006000340000400002c0001"], 0xb0}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=@ipv4_newrule={0x2c, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x14}, [@FRA_GENERIC_POLICY=@FRA_L3MDEV={0x5, 0x13, 0x1}, @FRA_SRC={0x8, 0x2, @multicast1}]}, 0x2c}}, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000bc0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r5, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000010c0)={0x40, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x2f, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}]}]}, 0x40}}, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x17, &(0x7f00000000c0), 0x4) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 04:54:44 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x227a, 0x300000000000000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="410023010000340200000200000008000100", @ANYRES32=r1, @ANYBLOB], 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000680)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0x2b, "3c3beec96792c694d9e1848bbac64cf3ad6b17b6434a0d2fa65bca431be3abac9041d3310baf4e47f5ace9"}}}, 0x3f) read$nci(r0, &(0x7f0000000380)=""/98, 0x62) write$nci(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="41759100"], 0x4) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x80a, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'wg2\x00', 0x4801}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) sendmsg$NFC_CMD_START_POLL(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100023010000340200000600000008000100", @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) 04:54:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3, 0x1, 0x2}}, 0x20) [ 55.028442][ T5197] 9pnet_fd: Insufficient options for proto=fd [ 55.034841][ T5197] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. [ 55.044658][ T5197] team_slave_0: entered allmulticast mode [ 55.052084][ T5197] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x2}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xf5d9}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xc4}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_io_uring_setup(0x2705, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000001440)=0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r6 = syz_io_uring_setup(0x24b9, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) r11 = accept(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) sendmsg$BATADV_CMD_SET_MESH(r11, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000002d86c4f8ac181a08f9ab992a22039c22ac2fcec04281810de8466c20aa6cee52e1a28f8beaaf1f", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf250f00000008002c00070000000500290000000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) r12 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r13 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r13, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r13, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000c00)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="fbae00000000000000001e0000001c002f800c00020000000000000000000c000380080001000200000008000300", @ANYRES32=r14, @ANYBLOB="d7d811d0788244f89850a1630d117357"], 0x38}}, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f00000001c0)={[{@shortname_mixed}, {@shortname_mixed}, {@fat=@fmask={'fmask', 0x3d, 0x36}}, {@shortname_win95}, {@utf8no}, {@fat=@fmask={'fmask', 0x3d, 0xba5}}, {@shortname_lower}, {@uni_xlateno}, {@utf8}, {@fat=@check_strict}, {@shortname_lower}, {@rodir}, {@rodir}, {@fat=@flush}, {@fat=@nfs_nostale_ro}, {@rodir}, {@utf8no}]}, 0x6, 0x2c0, &(0x7f0000000300)="$eJzs3T9rLFUYB+B3NpvZUYvdwkoEF7Swupjbic0GuRfEVF62UAsN3huQ7CIkEPAPrqlsbSws/ASC4AdJ4zcQbAU7IwRGZnYmOxvXdVeykZs8T5M3Z85v5pzJYTMp5uTDF8eHj/txcPrFL5FlSbQGMYjzJHrRitpXMWfwTQAAT7PzPI/f86l1cklEZJsbFgCwQav9/m/Pyp9uZFgAwAY9eve9t3f39h68k0UWD8dfnwyLv+yLr9PjuwfxcYziSbwW3biIKB8UtqN8WijKh3meT9r9Qi9eGU9OhkVy/MFZdf7d3yLK/E50o1c2XT5tlPm39h7s9Kca+Ukxjmer6w+K/P3oxvOX4bn8/QX5GKbx6suN8d+Lbvz8UXwSo3hcDmKW/3Kn338z//aPz98vhlfkk8nJsFP2m8m3bvhHAwAAAAAAAAAAAAAAAAAAAADALXav2junE+X+PUVTtf/O1kWkxbf9Wm9+f55pPqlP1NwfKM/zSR7fN7YU7OdVx1m+HS+0mxsLAgAAAAAAAAAAAAAAAAAAwN11/Olnh/uj0ZOjaynq3QDaEfHno4j/ep5Bo+WlWN65U11zfzRqVeVcn7O02RJbdZ8kYukwiklc0235t+KZq2Ouix9+LCa4zgmzRsvriye4vfha11nUq+twP1l8DztRt2TVIvkujZj1SWPFa6X/dCiPdZZfuvBQd+25p8+VxWRJn0iWDeyNX6d3rmpJrs4iLe/qwvh2VTTiV9bGSus5smn8758VSblbR2dzH0YAAAAAAAAAAAAAAAAAAHDHzd7+XXDwdGm0lXsVGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBbYvb//9coJlV4hc5pHB3/z1MEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgDvgrAAD//1ufWRg=") r15 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_WKALM_SET(r15, 0x4008700e, 0x0) r16 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r16, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) connect$inet(r16, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) shutdown(r16, 0x1) syz_io_uring_submit(r7, r8, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r6, 0xa3d, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x2) pread64(r6, &(0x7f0000000480)=""/18, 0x12, 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_submit(r3, r4, &(0x7f0000001400)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r1}) io_uring_enter(r2, 0xa3d, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") 04:54:44 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000040)={[{@min_batch_time={'min_batch_time', 0x3d, 0x100000000}}]}, 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) [ 55.144107][ T3733] ------------[ cut here ]------------ [ 55.149600][ T3733] WARNING: CPU: 0 PID: 3733 at kernel/kcov.c:860 kcov_remote_start+0x326/0x380 [ 55.151966][ T5224] loop0: detected capacity change from 0 to 128 [ 55.158603][ T3733] Modules linked in: [ 55.158615][ T3733] CPU: 0 PID: 3733 Comm: kworker/u8:8 Tainted: G W 6.9.0-rc4-syzkaller-00031-g96fca68c4fbf #0 [ 55.158638][ T3733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 55.158650][ T3733] Workqueue: nfc2_nci_cmd_wq nci_cmd_work [ 55.158679][ T3733] RIP: 0010:kcov_remote_start+0x326/0x380 [ 55.166227][ T5224] ext4: Bad value for 'min_batch_time' [ 55.168773][ T3733] Code: b0 f1 28 00 4c 89 f7 e8 18 5f 2a 00 e9 21 fd ff ff 0f 8d 1b fd ff ff 4c 89 f7 be 03 00 00 00 e8 90 5d 89 00 e9 09 fd ff ff 90 <0f> 0b 90 65 48 8b 05 5f 9d d2 7e 41 f7 c4 00 02 00 00 0f 84 f0 fc [ 55.168795][ T3733] RSP: 0000:ffffc9000138bcf0 EFLAGS: 00010002 [ 55.233094][ T3733] RAX: 0000000080000000 RBX: 0000000000000004 RCX: 0000000000000002 [ 55.241069][ T3733] RDX: 00000000000000a1 RSI: 0000000000000004 RDI: 0000000000000004 [ 55.249056][ T3733] RBP: 0000000000000004 R08: ffffffff84df8867 R09: 0000000000000000 [ 55.257089][ T3733] R10: 0001ffffffffffff R11: 0001c9000138bcd0 R12: 0000000000000246 [ 55.265171][ T3733] R13: ffff8881198b5200 R14: ffff888119e11500 R15: ffff888119fe9080 [ 55.273149][ T3733] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 55.282095][ T3733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.288690][ T3733] CR2: 00007f7bf2f45119 CR3: 00000001198d2000 CR4: 00000000003506f0 [ 55.297017][ T3733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.304984][ T3733] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.313116][ T3733] Call Trace: [ 55.316392][ T3733] [ 55.319315][ T3733] ? __warn+0x13c/0x350 [ 55.323475][ T3733] ? report_bug+0x315/0x420 [ 55.328043][ T3733] ? kcov_remote_start+0x326/0x380 [ 55.333197][ T3733] ? handle_bug+0x3e/0x70 [ 55.337586][ T3733] ? exc_invalid_op+0x1a/0x50 [ 55.342260][ T3733] ? asm_exc_invalid_op+0x1a/0x20 [ 55.347297][ T3733] ? nci_cmd_work+0x77/0x1b0 [ 55.352025][ T3733] ? kcov_remote_start+0x326/0x380 [ 55.357136][ T3733] ? skb_dequeue+0xb7/0xd0 [ 55.361549][ T3733] nci_cmd_work+0x89/0x1b0 [ 55.365960][ T3733] process_scheduled_works+0x465/0x990 [ 55.371446][ T3733] worker_thread+0x526/0x730 [ 55.376075][ T3733] ? __pfx_worker_thread+0x10/0x10 [ 55.381193][ T3733] kthread+0x1d1/0x210 [ 55.385294][ T3733] ? __pfx_kthread+0x10/0x10 [ 55.389950][ T3733] ret_from_fork+0x4b/0x60 04:54:44 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mlock2(&(0x7f0000215000/0x4000)=nil, 0x4000, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x2) fcntl$getown(r0, 0x9) mincore(&(0x7f0000dff000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/61) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000800)='./file2\x00', 0x404a, &(0x7f0000000140), 0x1, 0x76b, &(0x7f0000000fc0)="$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") rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r2, 0x20, &(0x7f0000000380)={&(0x7f0000000300)=""/113, 0x71, 0x0, &(0x7f0000001740)=""/4096, 0x1000}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000040)=0x18, &(0x7f0000000140)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) timer_create(0x0, &(0x7f0000000180)={0x0, 0x1e, 0x4, @tid=r1}, &(0x7f00000000c0)) timer_settime(0x0, 0x5, &(0x7f00000001c0)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0xfffffffffffffffe]}, 0x8, 0x0) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000200)=""/215, 0x7ffff000}], 0x6) [ 55.394500][ T3733] ? __pfx_kthread+0x10/0x10 [ 55.399089][ T3733] ret_from_fork_asm+0x1a/0x30 [ 55.403849][ T3733] [ 55.406912][ T3733] ---[ end trace 0000000000000000 ]--- [ 55.416975][ T5225] loop1: detected capacity change from 0 to 256 [ 55.426378][ T3289] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 55.479764][ T5229] loop0: detected capacity change from 0 to 2048 [ 55.488194][ T5229] EXT4-fs error (device loop0): __ext4_fill_super:5468: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 55.501771][ T5229] EXT4-fs (loop0): get root inode failed [ 55.507495][ T5229] EXT4-fs (loop0): mount failed [ 55.520833][ T27] ------------[ cut here ]------------ [ 55.526327][ T27] WARNING: CPU: 0 PID: 27 at kernel/kcov.c:860 kcov_remote_start+0x326/0x380 [ 55.535124][ T27] Modules linked in: [ 55.539094][ T27] CPU: 0 PID: 27 Comm: kworker/u8:1 Tainted: G W 6.9.0-rc4-syzkaller-00031-g96fca68c4fbf #0 [ 55.550596][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 55.560758][ T27] Workqueue: nfc2_nci_rx_wq nci_rx_work [ 55.566297][ T27] RIP: 0010:kcov_remote_start+0x326/0x380 [ 55.572006][ T27] Code: b0 f1 28 00 4c 89 f7 e8 18 5f 2a 00 e9 21 fd ff ff 0f 8d 1b fd ff ff 4c 89 f7 be 03 00 00 00 e8 90 5d 89 00 e9 09 fd ff ff 90 <0f> 0b 90 65 48 8b 05 5f 9d d2 7e 41 f7 c4 00 02 00 00 0f 84 f0 fc [ 55.591668][ T27] RSP: 0018:ffffc900000f3ce8 EFLAGS: 00010002 [ 55.597777][ T27] RAX: 0000000080000000 RBX: 0000000000000004 RCX: 0000000000000002 [ 55.605740][ T27] RDX: 00000000000008a8 RSI: 0000000000000004 RDI: 0000000000000004 [ 55.613701][ T27] RBP: 0000000000000004 R08: ffffffff84df8a12 R09: 0000000000000000 [ 55.621667][ T27] R10: 0001ffffffffffff R11: 0001c900000f3cc8 R12: 0000000000000246 [ 55.629770][ T27] R13: ffff888116d39000 R14: ffff888116d390d0 R15: ffff888101041080 [ 55.637807][ T27] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 55.646877][ T27] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.653463][ T27] CR2: 00007f7f1b9d5d58 CR3: 0000000116c98000 CR4: 00000000003506f0 [ 55.661430][ T27] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.669403][ T27] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.677369][ T27] Call Trace: [ 55.680633][ T27] [ 55.683549][ T27] ? __warn+0x13c/0x350 [ 55.687698][ T27] ? report_bug+0x315/0x420 [ 55.692208][ T27] ? kcov_remote_start+0x326/0x380 [ 55.697312][ T27] ? handle_bug+0x3e/0x70 [ 55.701631][ T27] ? exc_invalid_op+0x1a/0x50 [ 55.706325][ T27] ? asm_exc_invalid_op+0x1a/0x20 [ 55.711367][ T27] ? nci_rx_work+0x62/0x230 [ 55.715905][ T27] ? kcov_remote_start+0x326/0x380 [ 55.721068][ T27] ? skb_dequeue+0xb7/0xd0 [ 55.725568][ T27] nci_rx_work+0x7a/0x230 [ 55.729930][ T27] process_scheduled_works+0x465/0x990 [ 55.735378][ T27] worker_thread+0x526/0x730 [ 55.740029][ T27] ? _raw_spin_lock_irqsave+0x3c/0xb0 [ 55.745412][ T27] ? __pfx_worker_thread+0x10/0x10 [ 55.750578][ T27] kthread+0x1d1/0x210 [ 55.754631][ T27] ? __pfx_kthread+0x10/0x10 [ 55.759206][ T27] ret_from_fork+0x4b/0x60 [ 55.763628][ T27] ? __pfx_kthread+0x10/0x10 [ 55.768221][ T27] ret_from_fork_asm+0x1a/0x30 [ 55.773057][ T27] 04:54:45 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 55.776056][ T27] ---[ end trace 0000000000000000 ]--- [ 55.781650][ T27] nci: nci_rsp_packet: unknown rsp opcode 0x135 [ 55.790536][ T27] ------------[ cut here ]------------ [ 55.796008][ T27] WARNING: CPU: 0 PID: 27 at kernel/kcov.c:860 kcov_remote_start+0x326/0x380 [ 55.804826][ T27] Modules linked in: [ 55.808721][ T27] CPU: 0 PID: 27 Comm: kworker/u8:1 Tainted: G W 6.9.0-rc4-syzkaller-00031-g96fca68c4fbf #0 [ 55.820279][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 55.830386][ T27] Workqueue: nfc2_nci_rx_wq nci_rx_work [ 55.836006][ T27] RIP: 0010:kcov_remote_start+0x326/0x380 [ 55.841778][ T27] Code: b0 f1 28 00 4c 89 f7 e8 18 5f 2a 00 e9 21 fd ff ff 0f 8d 1b fd ff ff 4c 89 f7 be 03 00 00 00 e8 90 5d 89 00 e9 09 fd ff ff 90 <0f> 0b 90 65 48 8b 05 5f 9d d2 7e 41 f7 c4 00 02 00 00 0f 84 f0 fc [ 55.861373][ T27] RSP: 0018:ffffc900000f3ce8 EFLAGS: 00010002 [ 55.867437][ T27] RAX: 0000000080000000 RBX: 0000000000000004 RCX: 0000000000000002 [ 55.875400][ T27] RDX: 0000000000000535 RSI: 0000000000000004 RDI: 0000000000000004 [ 55.883484][ T27] RBP: 0000000000000004 R08: ffffffff84df8a12 R09: 0000000000000000 [ 55.891501][ T27] R10: 0001ffffffffffff R11: 0001c900000f3cc8 R12: 0000000000000246 [ 55.899466][ T27] R13: ffff888116d39000 R14: ffff888116d390d0 R15: ffff888101041080 [ 55.907479][ T27] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 55.916415][ T27] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.923075][ T27] CR2: 00007f7f1b9d5d58 CR3: 0000000118192000 CR4: 00000000003506f0 [ 55.931041][ T27] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.939000][ T27] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.946959][ T27] Call Trace: [ 55.950224][ T27] [ 55.953177][ T27] ? __warn+0x13c/0x350 [ 55.957326][ T27] ? report_bug+0x315/0x420 [ 55.961819][ T27] ? kcov_remote_start+0x326/0x380 [ 55.966936][ T27] ? handle_bug+0x3e/0x70 [ 55.971274][ T27] ? exc_invalid_op+0x1a/0x50 [ 55.975973][ T27] ? asm_exc_invalid_op+0x1a/0x20 [ 55.981013][ T27] ? nci_rx_work+0x62/0x230 [ 55.985516][ T27] ? kcov_remote_start+0x326/0x380 [ 55.990759][ T27] ? skb_dequeue+0xb7/0xd0 [ 55.995169][ T27] nci_rx_work+0x7a/0x230 [ 55.999556][ T27] process_scheduled_works+0x465/0x990 [ 56.005011][ T27] worker_thread+0x526/0x730 [ 56.009593][ T27] ? _raw_spin_lock_irqsave+0x3c/0xb0 [ 56.015026][ T27] ? __pfx_worker_thread+0x10/0x10 [ 56.020157][ T27] kthread+0x1d1/0x210 [ 56.024295][ T27] ? __pfx_kthread+0x10/0x10 [ 56.028879][ T27] ret_from_fork+0x4b/0x60 [ 56.033345][ T27] ? __pfx_kthread+0x10/0x10 [ 56.037963][ T27] ret_from_fork_asm+0x1a/0x30 [ 56.042971][ T27] [ 56.045976][ T27] ---[ end trace 0000000000000000 ]--- [ 56.067426][ T5218] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 56.072584][ T5237] loop2: detected capacity change from 0 to 512 04:54:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r8 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) [ 56.085081][ T5237] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 56.094207][ T5237] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 56.132087][ T5241] loop0: detected capacity change from 0 to 512 [ 56.138670][ T5237] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 56.156965][ T5237] System zones: 0-2, 18-18, 34-34 [ 56.175594][ T5241] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 56.191264][ T5237] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 56.209033][ T5237] EXT4-fs (loop2): 1 truncate cleaned up [ 56.211140][ T5241] EXT4-fs (loop0): 1 truncate cleaned up 04:54:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) sendto$inet(r4, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r6 = socket$inet(0xa, 0x801, 0x84) connect$inet(r6, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r6, 0x8) r7 = accept4(r6, 0x0, 0x0, 0x0) sendto$inet(r7, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r7, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r8, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:45 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r7 = dup(r6) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 56.222403][ T5241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5241 comm=syz-executor.0 [ 56.241011][ T5241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5241 comm=syz-executor.0 [ 56.256452][ T5241] 9pnet_fd: Insufficient options for proto=fd [ 56.269355][ T5241] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. 04:54:45 executing program 0: r0 = open(0x0, 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:45 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) (async) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x149800, 0x0) r0 = epoll_create1(0x0) socket$rds(0x15, 0x5, 0x0) (async) r1 = socket$rds(0x15, 0x5, 0x0) ioperm(0x0, 0x7, 0x8) (async) ioperm(0x0, 0x7, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r1}, 0x18) ioperm(0x6, 0x6, 0x0) (async) ioperm(0x6, 0x6, 0x0) setuid(0xee01) (async) setuid(0xee01) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) (async) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) read(r0, &(0x7f0000000380)=""/210, 0xd2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r4, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x70000}]) ftruncate(r2, 0x7ffa) (async) ftruncate(r2, 0x7ffa) fcntl$setstatus(r2, 0x4, 0x6800) (async) fcntl$setstatus(r2, 0x4, 0x6800) pwritev2(r2, &(0x7f0000000500)=[{&(0x7f0000000340)="94", 0x1}], 0x1, 0x0, 0x0, 0x9) uname(&(0x7f0000000180)=""/224) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x40010, r1, 0x4a8e000) socket$can_raw(0x1d, 0x3, 0x1) (async) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) recvmmsg(r5, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000008340)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$rds(0x15, 0x5, 0x0) (async) socket$rds(0x15, 0x5, 0x0) [ 56.279459][ T5241] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x2}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xf5d9}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xc4}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_io_uring_setup(0x2705, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000001440)=0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r6 = syz_io_uring_setup(0x24b9, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) r11 = accept(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) sendmsg$BATADV_CMD_SET_MESH(r11, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000002d86c4f8ac181a08f9ab992a22039c22ac2fcec04281810de8466c20aa6cee52e1a28f8beaaf1f", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf250f00000008002c00070000000500290000000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) r12 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r13 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r13, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r13, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000c00)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="fbae00000000000000001e0000001c002f800c00020000000000000000000c000380080001000200000008000300", @ANYRES32=r14, @ANYBLOB="d7d811d0788244f89850a1630d117357"], 0x38}}, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f00000001c0)={[{@shortname_mixed}, {@shortname_mixed}, {@fat=@fmask={'fmask', 0x3d, 0x36}}, {@shortname_win95}, {@utf8no}, {@fat=@fmask={'fmask', 0x3d, 0xba5}}, {@shortname_lower}, {@uni_xlateno}, {@utf8}, {@fat=@check_strict}, {@shortname_lower}, {@rodir}, {@rodir}, {@fat=@flush}, {@fat=@nfs_nostale_ro}, {@rodir}, {@utf8no}]}, 0x6, 0x2c0, &(0x7f0000000300)="$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") r15 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_WKALM_SET(r15, 0x4008700e, 0x0) r16 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r16, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) connect$inet(r16, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) shutdown(r16, 0x1) syz_io_uring_submit(r7, r8, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r6, 0xa3d, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x2) pread64(r6, &(0x7f0000000480)=""/18, 0x12, 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_submit(r3, r4, &(0x7f0000001400)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r1}) io_uring_enter(r2, 0xa3d, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") 04:54:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000040)={[{@min_batch_time={'min_batch_time', 0x3d, 0x100000000}}]}, 0x0, 0x236, &(0x7f0000000300)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0) (async) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000580)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='mnt/encrypted_dir\x00', 0x1c0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000680)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000006c0)=@v2={0x2, @aes256, 0x0, '\x00', @a}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42, 0x180) write(r3, &(0x7f0000000740)='foo', 0x3) 04:54:45 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 56.438077][ T5262] loop3: detected capacity change from 0 to 128 [ 56.446607][ T5262] ext4: Bad value for 'min_batch_time' 04:54:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 57.125218][ T5268] loop2: detected capacity change from 0 to 512 [ 57.133896][ T5268] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 57.142956][ T5268] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 57.152947][ T5268] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 57.161177][ T5268] System zones: 0-2, 18-18, 34-34 04:54:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000000140)="15038c8947a63c5a2d92d55044629e732a83d9b0a32402ea495433aab89818951476a3653dfdc59517887a4c5df19f90ac8997145135b68dafc0d296ae5aea39633d0398312aedb979846a137d78fd0e697c767b60c30c74e3e130cc9fe5b39e4d8580aa76db44f58665ae555bf39b44e75c1904f2eb3b76814e03a0e9", 0x7d}], 0x3, 0x0, 0x0, 0x8004}, 0x24045) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="38010000100013070000000000000000fc010000000000000000000000000001fe04000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0002002400000000000000480001006469676573745f6e756c6c00"/240], 0x138}}, 0x0) accept4(r0, &(0x7f0000000380)=@phonet, &(0x7f0000000400)=0x80, 0x80000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000280)=0x3, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) r3 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r3, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) r4 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r5, 0xe0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240), 0x0, 0x3, &(0x7f0000000880)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000480), 0x8, 0x0, 0x8, 0x8, &(0x7f0000001300)}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14) recvmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}], 0x1}}], 0x1, 0x100, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r4], 0xc63b9e35) [ 57.167807][ T5268] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 57.183208][ T5268] EXT4-fs (loop2): 1 truncate cleaned up 04:54:46 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r6}, 0x10) r7 = dup(0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 57.220492][ T5272] loop0: detected capacity change from 0 to 512 [ 57.228620][ T5272] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 57.240295][ T5272] EXT4-fs (loop0): 1 truncate cleaned up [ 57.248840][ T5272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5272 comm=syz-executor.0 [ 57.276580][ T5272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5272 comm=syz-executor.0 [ 57.290561][ T5272] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. [ 57.301781][ T5272] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:47 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:47 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) r7 = dup(r6) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 58.148350][ T5289] loop2: detected capacity change from 0 to 512 [ 58.160357][ T5289] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 58.169491][ T5289] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 58.178884][ T5289] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 58.186992][ T5289] System zones: 0-2, 18-18, 34-34 04:54:47 executing program 2: socketpair(0xf, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x3, 0x5, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000a80)=@deltaction={0x188, 0x31, 0x8a0, 0x70bd25, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xd92}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffeff}}]}, @TCA_ACT_TAB={0x4, 0x1, [{0x0, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x9}}, {0x0, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'csum\x00'}}, {0x0, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x4000000}}, {0x0, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x7ff}}, {0x0, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @TCA_ACT_TAB={0x7c, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x14, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xe9}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xffffffffffffffc9, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5061}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}]}, @TCA_ACT_TAB={0x4}]}, 0x188}, 0x1, 0x0, 0x0, 0x811}, 0x8041) getsockopt$IP_SET_OP_GET_BYNAME(r4, 0x1, 0x53, &(0x7f0000000700)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000740)=0x28) getsockname(r4, &(0x7f0000000780)=@in={0x2, 0x0, @initdev}, &(0x7f0000000800)=0x80) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000840), &(0x7f0000000880)=0x4) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f00000008c0), 0x4) r6 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000001c40)={&(0x7f0000000900)=@in6={0xa, 0x4e21, 0x4, @remote, 0x80000000}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000980)="f92b3fcd9574bb7b4dc608537b40005490758f7d5b21b2a4cf2de8a9e9420ed4ab1dc03cce70110dd58e89fbeabece5dc4175f509b96cdf3b02a3cd44f36e2c9001ba07ed2b88e59a26bef67633a2659bdae16f7382e828f034159fed41a36ef9f28b5d8eea9714cbf2e2faa597994d6d32f95de4c801c0ad7a692f524378059fe819cd8741104d8566f556562770451921f218e5a59d40ee3b556f5c56aa1ba06abc3d88c6571c60fc27ddf62cdd4329939bdb2ea37b0919231071fcb46", 0xbe}], 0x1, &(0x7f0000002600)=ANY=[@ANYBLOB="1010000000000000f6010000030000006795aad72015fc515b52d19972ad672ba535275c4ff13b22b26d031fc68914bf59e129209cadace87b34bd18c4c7ea799a2c586f5b0116670c7e53b063041a99b86fff89e60b8063ce2ab088d57d3e8eaceabbb5bbfc34b9b7afdc36c062d1e4c29c38d3c1ec373c5b4a92165b30c15c5dd8e6b06804c54358b2f38f4506f32079993a96fcd847d62d1b527494dbb75fc9c50a39a76fee8204ea508c3457cebfb904c183f7303847900e9d4d5bf36959c8612c6a3ee4a2ebc935b4ca91a0574753216ad5f5d9e0bb39c4251c59aeecebf98463af18791b06b032c44aba4ea1161dfc32a8e50721bebe2bf8669c965a276b6f19ac1b1601a52a6cc74e9770d3b3477dccd23c2ef14a74b0451141337197e1072a028da8390c1bdd974045d4b800a5cae30c580a0bf96b94246f3ab9628c31ff3bcc00b776c1b336ecbf6e32ea351c573ccf8a20b9e8d31a85204f99f0dc266caa149ebf7f7d4201aad638ff5e4b43475e378e66477db475c0e3546efa3680fadef85a473a21372bd92dbe44c526eb7aa3d2b2c01833f13c70ecba85d488943515875d042cc3162d6fe3ea245913817b69d9668f19d7c512befbaaf4939c30cb119612812b23055f6b6265ba4404f09654dd957ab8f121abffb5e6321f2a00e27b0c41e54044f55f1ee2cb6fa5251a7c1367f07178f021e62263726f268fc08f49f1d714b27a375302cc963175a6a7877af052ae0c26ddaac6c5cf334848c54c562341919354c17901d83163c2ccf1b6150db7e39dff76bd989deb09ac45661691f2cfd6ea6ec73fc7bda8f86c4dc4e191cdfe08d74108d083bd7be0cf0f15f529e92e1e91e60780cdf1fcbb1d5772d143ca299b11dbd0149b1d83a02a03816aa3ae28ca89faebb795866d682d5418a91a7aa60630b555f5449ef5a8be5f5344e9fed3c92825b145ecd3f0d41f8cf894bffc92dd67fbeec7b6456028b206fd3d3025d69b49d087a2497f5e7bd85539689ed2834abd876d9875c7922617a1dcd646bde15bbe11a4143b45bcd95298c43b7977e588bb6e6048d4b2be82cf6fea25b5bbd6def47cda727356ba412fe093811340220f5b4288d5a15dc0ff8b3e07d4f2b8d4f59ad55c92755866277b9c6a2f214cfc224ccc18e6955a871e4ebb5055652d87d3e94e323a0752ec8c1fca4298be76faf094a899c0a66454031fd7bcdd8ea5e400ae01aecf1f1a2d4f94178de2c765171f6806974d920e256e52ff5e9cd3d07263a72cb96754e0f23ca0d0cd6477fcb934c4f58f0f26cf40d0f55e5353761b311cc8e4ec42b4b2d0dfdedab78f14741f8cb1fb3f37653c6de0b145f8a2a95ebc125baafd999eee44be74f64d5c74bf8c1d19fd4647869ded59b259501761f91abe6bf5b347c6340b584d031b80a8f87ef98eaf4d1501f5ca9062e6cedac2d67c124bd29ccf2bbfd6189651eb54ff1c4befb6ba8f996d1d4b4edd5faba51826c14d3361a2f437061804047cd45cb187328ce7bb815b475b8a85527c7fe53c62313c66422c36c960ca2c44693864bc559fffc30a35549e7ac2131cdf598b8a958aac6bccfc9b8d3d95caa9c75e36cde15bf0268bac7595ee4e76975963e30509f7aa732a7f9825c372e73b44b574a98bb310621eea510540e99e8106e65f5646d3a3a28b3556cdcfc7ad1db940e5217524095ed1b46fff3092a0eef4cfe0794292b173b87b0d2962f78b3823173b6cd2f9cded2bbe98b6228f6fc1f561f10b9d8a151704b5dbcef3051aadca036a9108ff4a73c1eaf7e5bbdccab7a148057e7bc1a61e40f43ae9f1cae91c5a7b8dd655b4e40d399a52158be8891e938e1c79d5b794c03e5cd818cc9923a416c84a789c707fd5a0fa18bbca2d30a5e1521a1a93e2f09d8bd0bca10335dc1d16b7f85c22ebedabc68a01e988e39a9c2e8eed209334947c9e7ca8ab59bbf1f3b0616dccaca5e6eff4a19df94d3d2109b19b51eea1d6f5c6831d21cefb16c9120289852f022c43778c1115f3ace2c0a38b9a1aa2315f9d5e9558f1a3f2cd0968c49fa5d55137684c3b4cdbbb22d2e785da97ce920675d20a0da0d4892d7f26b77bd697469062fbb70a050d1c4ed04a8b97bfea0cdf35a0faa6931378a95e2f3f8f59d8edc4d14e0ba613dcab0fc4fa79011e7a86c325c82f5f049eaab69abaa46f315c799e0873a25e775a7657d27b2f14fd24eb93670f8e0bd2384159495c806cef03db05f2d0920686e27605264b7df42e2a43935adc7488e7c04cc7227b33c161fb13998d71a0eaa1d1b16b9397c3ebf17aced93437c04796b6c1bfa17aeb87838d096b82ea4e0b37eac5f6a799519f5579938dfad84791e8d9a41252419ddd0e4dd8212ebdb147de657c5880684692e7c6e8613f9286a4c3db76bed9262adbf05770413023a893e9f76b6505e9e8c24f293b60fda23448d7d91951ec7caee31064afedf69c5eb68236c2d7a317801b5fdca03d3bd62537a32bd18e360c8f400b6975c0ef98bfe4f899536247e03626eeb01fc16773da40fde1ab73bce2b4b9e63fefabcd8399e3cf03ce3c5689af744faa9f0c4f7b2c1d6ca0bc6ee20a9e46506af7e561553b4da3895ad0c90a51e15dfba0651b0ad548e254d67c1fd316805fc03343dece9d5f7fcd7b2991da1d7bc7e077d53facb195258ac37c55b0f23f79c8cf83bd42715a9aac41a949bf0d7aa3fd62c1004229aae44fb75e1a4bb01ae9ce15030dcf7941a9a4a4d242f822f0f829e0bb11cc4982037f69b1359d7ffd8a44e8d34fea5911a6ac645a587654b8c910eaa4d5acc1253b94512757f999492f1bd5e046ec96d6e5d1265672f52e4a35ff0686e3bd1f7bd85131d9a1b61909a18fdecd81b363374c97d8b34fda98295bad9ad55d4d2d17d69c8b216bafa4d5cbc3015629b4af261cb8037e5a41bc4b887845647dd7913ab758304e630e05850b953b01070785322b88ef8db96ea15e315d492c865bfccf611c32b900089aabba4bbf72b426b1e9248e649a7698d534fae583580b0d2da1fd298316e336494ed7407e7f48e10a29ef9be195f784c5ef64655b37924c4d4493db058b05c92cfd7d7f0355919349af8d5a55ddaa973fde452d6170df82576102f56bc64d75ba84eb0cc26e2cb2b7ea54b5ebfd49f9897078591d1c0b0f32f0c7676c05d443fdd846d27c6c8f24b8f90f018bf9c0a999efc3c2a9cfb98e7d7faf89e3799810d33c970d2035449504fee154aab142e74801d089f11d5f07572612c255b2d979b58880cceecaf806e0170f4202910a5472f4ff0624fef85dfc87ff350af0fb0825ccb038663c01dc8e14707a30d466e32a6562acd276d82d3f295dfd16259949aeacc7a61d39c54540f468b57f7a9a362e885bd90c27e68e67afcad001207d2b52bb74e99050dca5f1fda5cc66d9a092aa99f9764dcefa75ff77caac0ac4a096cb165a5b4abc8dce9af1ceeeacce9657ab8af91ee51e6066db2c0464d674b1c1179e9e78713f3e7de1d72e7e1efda16af0816463e1021ade47dc75173140ad3b38033847dcdb5e7c6acc9c0910b5c4e2bea1d5a8947cafb9ce9c48c760a54470c383bdd9c6b69e32d02723535b2571bb01cb6678c932018d17087e4a06df4fc1e5d245b85d4008b919fed3761cae282e327f996b71c477b92b1cac6069598ba49ea10fd4e76aeb8f34e159268c7ce629525accb7be49f920586665a154d28a80edcbf4417954293b648bc036b1660031730a59617c7b86f35d1690f3d6ea2a3e0cfa4c5c3036db96b48368ce4e5b623977da34ba4e0e286ddfa955d61bcae8a618b62f347855d680a72bffb93ac43241f5fc73a487d118899dfb0d01a8acd7300265d5b89199451150ffba68ff4d0d86f6128422d17d4c6c1fdf01b1940234ebb9c8c2e3e22ae42508377856ad29c5732b9c68937f6f27acc1fea8a294167ff1e03c21d9fe250ff8685cf69ea40a3d844e09b01f49a638f694d21c8f1aa99b2b3fedd728e6f6e5b8786cbd694750d9d9315d2c63d568503aaae0653f7bf1f12607785215d701e82fb33b1d37592a0324936164b9a4a0f9680ee36b3c9f248db966ea68ecec02dffe1e39bb0f5396bad381be54e65fd95b8161774e16e88adfb5baf4d6482c7481670a6c599285e13f9c330b00705b2894d71db4b972be4a64880527129af64feab781502386aa81ae120b7b6302ab508215aa052916dfd30de1eebca390dd4d16587e05b08c7b42e305b85d3ee2e07728adc01acfbb887c7960416afc1573ad22aa69c5ac688b3595df85b23f0fb2dd9fe39cd2e3821b4dc0908986f7b3500c3dc19d8fed54712a6d2a7bd95a06f85e8cea246cc0cd1356cc5523ed82215e88231acec2503b8cbc148caca450b92a01d42c94ed83efaaf58c11dc6aa5083e34e5bb0646ea76f540d3b0c7dc21e69186bab7ccfc027ddc9e9bc6a7513a2b7043d3c98f3237c76210df8e85cc63311fee90f6069c84c2efa3579fa5c776b1266793748035ee6bc411b91134535f470da42eac83b6cdc2ec1085dd3e43e0e8db46b8c8b977da46efa473b7e2d1dfd1e4f070421ee7f2785835029cdd00bcdc56d58be7a16a3bda7cdf0580ec481e1f0b6340736f0ff98777a581efff04ba6e19bb0ddd3129e81e17ebb5f03a75954dc9ba1b02e7bf9bc73273dbae95b4e6b764885e460f9b8c1e464e8fb58dfc2a7f856896dbbcab919500485b6f8f5091eca03d70dceadfd4bf1b20dcc267a80f539fabf443f9cf74e53ec1a7cd546f8832e30e26dd640c4431196f68b8ae45fe257766e0a7b9aee97e8d7531b3ece8b6200ba17f2214c39aa6881a23e9d0587084d1a939679bacc15270fd3c1f7b5df44a2704a60862c406cc12c87c89fdd12b4b1a77a13d55e575695cb637c08a86693649f6d4e1e7a0ed27edef34193ea2fc8488d4afc7ac25b47a6b7c5ed9a24bbeccd4c3ee8f7bdaf6450e1208835a32e61bb6b157ed5eef8024645c95bf74c2914b938dcb4be0c8a27f69b642b4fa00751597ad932b91eb9ba7697c73bb174d101c9a0d539d520a454649e086e729f9b69108e79e084c38b26bf154307d72308d07cd9bc114e16d370cd7e34e13cdce337163c8eb30f7ba9a5d3b94801e2d63bd8201c1e95d08a537001ad3a02d7f947e3a1083f2c2af488f5f7fd900f23ea6f94e31b5277e36a7035aa9fa9fac8c47efae7e988ca48fd490adfd546f46d7527acf0cf5c3082aece84e0e8589e9c4cc171f4bfc313bf6e6b4b0c19fd959f4a3da697fff32a8843f5c6baa3066fe9dac6cfbbd03aea0ddea1ecac688b6dc6b79cd6cc75c9e3ff9e3ec168b4a0be4a6067cdeba65b9f52cff9ce5e866b2ae4bd0e30d824926d7234c5b44351e6dca13d30a9ef0c23a4e01ae8b8e8fef9380f7dbe8505b50754ca26c318a4bdc33568df71ff40c0b50718444829e7b4b7c63e7e6d50c6794cf3f7287122e4bf7d41cc5914f996b0d0f3023dbf5afb258d34e18873d4d2d71a51c5adfd9b249f184bb9452aee01e1dc3d11ca46d6a74f58236e1664be3c36eca015e3b66d6ae0e8f8dee68257eb7c890e429c83c03a2046a2ffd1e338fecee7476836394abced916d7eee6a5197b0038bcd89fd1260fb652de584cfefb2d72d996473a18cd1f2a57889ef2c852d060a6ec576dbee9e0dbe452e753cc789c3d26c2637791a6e4e9728634dcfd9f1501c439ebba355d14c76a87419b51a4e3616d1cba33ccafad65efb07f761cfd8524877cbd98b6b8fa6cdef8517c0a5495c4a322efefd6787ec408d223f45f71250b17217156e69c07aa00000000e8000000000000000401000003d7000095ce028cbebe812d2ff3ab778ae1b749df57dce3263658f0f9c65a5e65f50dce4f8e9dd5fac09c3707f586422ebcac9c09a46e49ee71ba16db62eab64afadcac2f97f854cb6276163a10a7582ade8b01bd7b6ff21a78dd725260d414e7f11838fe31909758d71f6c301ec1d0404ff7443aac69a738d0f324ac13b384fab0e3d272d7870f7e203488ded79997a7201c952e9841fa08f7dedd945ac867e48088719ad7014a1128e1b597f4248efb543049d9aeac0a94d809ef25d40944e29eb12e5358ba9da0159c64036ee38d4e87bee3535ae09cfdb8000090000000000000000701000005000000a4be78c8574365810c0dba9c0035a0744bf16027cec34a10055e6d71e7128e5cdc1e2a7d5871f1c7cce86173f763311aa779dc84d6e595a57a8b38e196f8abcb1deaf6cca561845a9f8454e94df97505a937def925700d3fa33880d21e6213399328987b543fe33f5b5e006502c75ec49205a45fe89aa2e99e4d3ff3000000004f1947b2aaa22d1a198aaa86222bfd9fbefddbd2ec46cad207c7551b5cdb63ffd09fe04d29388470cb4c4df9d6f600f016b8cb5d259dd5ffd48c9a9d67a970fc51ce5dd4dd1db53d8526ab0f96504df8fa768848566c29b39dddb302ad83b5fa6fbe37ed5557ee283c1bc63fbb768718a26f9ff2b1a757cbfced7e36398c5d0fe87d7aeb1f7dd65a1b47f5cdd43812d3cb75ac9e689ebe93faa7f9ad53ea8c8b426a4ac624e614989344ea11b54ae26c6a249e40fdd9143d340bbee23ed436ad6cc20e055e508d5c6d0e719bd129645e26bba4bdcb05873c2e43edac1eb67e92e7f719a3d2377ba334cee07b6411f4ea3111af6c6840b44391c0cb02283e27dd99c52c0e6b7f9ae96706dba2d441d44840d8e2d1e22cd82a6cbb2b942f7b113cd4a4d85f8d692233ebe12dd5"], 0x1188}, 0x40090) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000001c80)='geneve1\x00') r7 = socket$igmp(0x2, 0x3, 0x2) tee(r7, r4, 0x9, 0xc) sendmsg$kcm(r6, &(0x7f0000002280)={&(0x7f0000001cc0)=@l2tp6={0xa, 0x0, 0xf26d, @mcast1, 0x200}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001d40)="a0f267112b1f2f7ec8280acd95e18ef6fa19fb357c097b5253e80f79abe49e1c3c03b8a60f5dd61cacb0fc", 0x2b}], 0x1, &(0x7f0000001dc0)=[{0x48, 0x11, 0xfffffffe, "14057d05c8f89db49f8672bbd4514990752892fd36cb3bbc82385199d0f72dc20ddec68eabfa98980fd9e614b190c47761a95e61523d"}, {0xa8, 0x10d, 0xffff, "4983744a75fcd3ad56cc99f908a904043c917f9689d5877dd538b585561b4f77ef0b2ebbe6f0b1e9d19df4939492621d6ac7d1dc4ac5cad40749d9a96ff03b11591aa1c7a7a6757c7a888ebf5d10787ea535fb6fd24cffc76e61133005327bf87eb512dcd086c40ebd28165c301285adf35f5ca36b9dd82631376b876d4631719f0b2e687ae4455c8587aeb72064c0c558"}, {0xa8, 0x107, 0x7fff, "26a38d680ff7f12ee2f4c9df07eee10261d208430289bb38b3e323d43b3ef51816b4a8db82397e41e2e764c43d4e2bd2bb473de7339dbc1d2baff3b7bc9583fd53244e3281230ad57f9e20ea80ed28b2ca63227b2a911ade26e69697ca670b7160751a76691d6b40922c94baf195bac0ef95cef6ca8f810412fd084dcb188a593077c84e4d97dd04fabc990b3214d3b0d474c169b7d7171c"}, {0x78, 0x102, 0x2, "47b20f425d142b5bc37fd266c39f3c969c96b3b9261b91f46ff27f32c69e5635e98ce4d834efa56b61daa8f43cc98086badbbe1171dd36888c6c82ba1c018ffb1f4fddfdaae35eedd82083ca789c49475b1aa15876780251009cb646e935de6dbeb9d23dda54e5bd"}, {0xd8, 0x110, 0x5, "e3f4c76b41c370b0a43fad9b4ede1b2ad6c7ce6980591ad1e039920c11d94d84e22809dcad4e36144acd1b92c0f4cddc4c4cc95d1093c11fd7eb144b255ef2e414101a04ee7bd49cf3fc3f7c9ad9ddce5fc8ad57e1de8ca6f4a183b8215d19bf99e3976f24cef8480dc105f1d4f513d4bfc32d36a39970c4221c611acf580ac58419d29a86330e33db2a4296beb33a4f14b26faf2b33ce29cc7d09e5d2c2c6a9044c74a04879d1b47c1a8e012acde0200afd2f23ef3e4a3b8b783b70a35a727a0b7b6209"}, {0x108, 0x10c, 0x3, "76c60a79f8618e1f5a2960164fae63ac65e721b9476fae33f421f92c3969d75aa075bc68ff1dee7ecc892a76a4faae5d12f3b541102653ad2c06601cf181d41869f8d7bfc54d304f8199c70170bf21fcd27b877a336c42a68b523c67a7d93d837859b24ba2ee2209d4bdc201ee8052864cc0acd027c53d52f31685a2843aefb3c701db063efcf9b85adb8bd4fea14fa21de0581b01613b05b3c8e4eaba9a6cca389cf818257956889236963894c03912dc46727ce059e597502c59a619b53f1d8b8ce88fef5239a61d8f2004dc0cfae02e65e12f909596c2cb9991d8ee6a5aec3830c7708d06ccdc34c24936db7d97f9c4aab08c024120f7"}, {0xc0, 0x28a98f15ce309fcb, 0x8, "c012e97f5cc6102e73ad64de1fccda612e9d21955249a43a476fce866916ab5f752a7ece73cb71b2c787bdcb75ff74f0542fe28490115d704bbbf115fa3097eaf7cce930b692b588d4fa9ce572088ff4270a489cfbd6bcbc0454e302ffbb414caf79315e91591ac60e1cb403f020999d1ab129c3a54022a58b04ab37cded103f1ffd87250d83e29fdf03d4fba5243278aaf6a37180bf6a69fe1b38704d806acdf4a7278481ba55d693"}], 0x4b0}, 0x20000040) socket$packet(0x11, 0x2, 0x300) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) pipe2$watch_queue(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002380), r6) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000023c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r8, &(0x7f0000002500)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002400)=ANY=[@ANYBLOB="12000000", @ANYRES16=r9, @ANYBLOB="10002abd7000fcdbdf254400000008000300", @ANYRES32, @ANYBLOB="0c009900020000003800000004002400040008010400bf0008000c000300000008000d00ffffffff74005a802c000280140005000500000002000400ff0105000800ff7f14000300030006000900dc000900ed0e040002001400008005000700000000000500060000000000300002801400050000001f0d8b4f0800ff7f0100020000000d0001003660032416040218060000000500070002000000"], 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f0000002540)) syz_genetlink_get_family_id$ipvs(&(0x7f00000025c0), r8) [ 58.193464][ T5289] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 58.209569][ T5289] EXT4-fs (loop2): 1 truncate cleaned up 04:54:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:47 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r6}, 0x10) r7 = dup(0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 58.365791][ T5299] loop3: detected capacity change from 0 to 512 [ 58.377056][ T5299] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 58.418669][ T5299] EXT4-fs (loop3): 1 truncate cleaned up [ 58.426364][ T5299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5299 comm=syz-executor.3 [ 58.440560][ T5299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5299 comm=syz-executor.3 04:54:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0xee0000b0}], 0x1, 0x0) socket$kcm(0x2, 0xa, 0x2) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) [ 58.460376][ T5299] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 04:54:47 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x7, &(0x7f0000000300)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x67}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) socket$nl_route(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x572}, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000340)=0xb6, 0x7fffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) socket$l2tp6(0xa, 0x2, 0x73) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x0, {}, [{0x60, 0x1, [@m_vlan={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$igmp(0x2, 0x3, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x24, 0x10, 0x400, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10000, 0x4000}, [@IFLA_IFALIASn={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010003b15000000000000000000004888", @ANYRES32=0x0, @ANYBLOB="d530d995212cf95a2000128008000100687372001400028008000200", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES64=r6], 0x40}}, 0x0) [ 58.500079][ T5299] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 58.598625][ T5309] loop2: detected capacity change from 0 to 512 [ 58.627275][ T5309] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 58.636454][ T5309] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 04:54:48 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@grpid}, {@abort}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) [ 58.662484][ T5309] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 58.675387][ T5309] System zones: 0-2, 18-18, 34-34 [ 58.684885][ T5309] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 58.705150][ T5309] EXT4-fs (loop2): 1 truncate cleaned up 04:54:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:48 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000003c0)={'bridge0\x00'}) ioctl$sock_SIOCBRDELBR(r0, 0x8907, &(0x7f0000000080)='bridge0\x00') [ 58.845055][ T5317] loop3: detected capacity change from 0 to 512 [ 58.864189][ T5317] EXT4-fs: Ignoring removed mblk_io_submit option 04:54:48 executing program 2: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000064790000b7030000000003808500000083000000bc09000000000000e5090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095000000000000002b645228decca92745e06985251167ade62d7d0c03517e946ad50159e70e73eba33c2d71cb2195a6692ce335a7f5d1b39776c145212d663f733dba07a34d0b78df67c8e7e1595fda21e2569efebf8e40b94d23095e71269720aead33dca232dc9dd015558161a5e65b251ee1f9e88cc649099b9c60f1b096078748320b89000000000000000097aea5d14608bf118d27cba8eb0d379ed818fb25e50ea479ccc0d75f396cb68aab5326e50e5c158a1dc8db43286983c1630a64663d584f611e5c51cbddd36a"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 58.900495][ T5317] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 58.913680][ T5317] EXT4-fs (loop3): 1 truncate cleaned up 04:54:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0xee0000b0}], 0x1, 0x0) socket$kcm(0x2, 0xa, 0x2) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xd, &(0x7f00000000c0)=@framed={{}, [@func, @exit, @printk={@ld={0x18, 0x0}, {}, {0x5}, {}, {}, {}, {0x85, 0x0, 0x0, 0x8}}]}, 0x0}, 0x90) (rerun: 64) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000000c0)=0x1) (async, rerun: 64) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000100)=""/67, 0x43}], 0x1) (async, rerun: 64) r2 = fcntl$dupfd(r1, 0x0, r1) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) (async) syz_io_uring_submit(0x0, 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x10e) write$sndseq(r2, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}], 0x38) (async) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000004c0)) [ 58.986672][ T5329] loop4: detected capacity change from 0 to 512 [ 59.004229][ T5329] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode 04:54:48 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") 04:54:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 59.036775][ T5329] EXT4-fs (loop4): 1 truncate cleaned up [ 59.058720][ T5329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5329 comm=syz-executor.4 [ 59.091636][ T5329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5329 comm=syz-executor.4 [ 59.118911][ T5340] loop1: detected capacity change from 0 to 512 04:54:48 executing program 2: socketpair(0xf, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x3, 0x5, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0), 0xfea7) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000a80)=@deltaction={0x188, 0x31, 0x8a0, 0x70bd25, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xd92}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffeff}}]}, @TCA_ACT_TAB={0x4, 0x1, [{0x0, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x9}}, {0x0, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'csum\x00'}}, {0x0, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x4000000}}, {0x0, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x7ff}}, {0x0, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @TCA_ACT_TAB={0x7c, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x14, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xe9}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xffffffffffffffc9, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5061}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}]}, @TCA_ACT_TAB={0x4}]}, 0x188}, 0x1, 0x0, 0x0, 0x811}, 0x8041) (async) getsockopt$IP_SET_OP_GET_BYNAME(r4, 0x1, 0x53, &(0x7f0000000700)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000740)=0x28) (async) getsockname(r4, &(0x7f0000000780)=@in={0x2, 0x0, @initdev}, &(0x7f0000000800)=0x80) (async) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000840), &(0x7f0000000880)=0x4) (async) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f00000008c0), 0x4) (async, rerun: 32) r6 = socket$kcm(0x29, 0x0, 0x0) (rerun: 32) sendmsg$kcm(r6, &(0x7f0000001c40)={&(0x7f0000000900)=@in6={0xa, 0x4e21, 0x4, @remote, 0x80000000}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000980)="f92b3fcd9574bb7b4dc608537b40005490758f7d5b21b2a4cf2de8a9e9420ed4ab1dc03cce70110dd58e89fbeabece5dc4175f509b96cdf3b02a3cd44f36e2c9001ba07ed2b88e59a26bef67633a2659bdae16f7382e828f034159fed41a36ef9f28b5d8eea9714cbf2e2faa597994d6d32f95de4c801c0ad7a692f524378059fe819cd8741104d8566f556562770451921f218e5a59d40ee3b556f5c56aa1ba06abc3d88c6571c60fc27ddf62cdd4329939bdb2ea37b0919231071fcb46", 0xbe}], 0x1, &(0x7f0000002600)=ANY=[@ANYBLOB="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"], 0x1188}, 0x40090) (async) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000001c80)='geneve1\x00') r7 = socket$igmp(0x2, 0x3, 0x2) tee(r7, r4, 0x9, 0xc) sendmsg$kcm(r6, &(0x7f0000002280)={&(0x7f0000001cc0)=@l2tp6={0xa, 0x0, 0xf26d, @mcast1, 0x200}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001d40)="a0f267112b1f2f7ec8280acd95e18ef6fa19fb357c097b5253e80f79abe49e1c3c03b8a60f5dd61cacb0fc", 0x2b}], 0x1, &(0x7f0000001dc0)=[{0x48, 0x11, 0xfffffffe, "14057d05c8f89db49f8672bbd4514990752892fd36cb3bbc82385199d0f72dc20ddec68eabfa98980fd9e614b190c47761a95e61523d"}, {0xa8, 0x10d, 0xffff, "4983744a75fcd3ad56cc99f908a904043c917f9689d5877dd538b585561b4f77ef0b2ebbe6f0b1e9d19df4939492621d6ac7d1dc4ac5cad40749d9a96ff03b11591aa1c7a7a6757c7a888ebf5d10787ea535fb6fd24cffc76e61133005327bf87eb512dcd086c40ebd28165c301285adf35f5ca36b9dd82631376b876d4631719f0b2e687ae4455c8587aeb72064c0c558"}, {0xa8, 0x107, 0x7fff, "26a38d680ff7f12ee2f4c9df07eee10261d208430289bb38b3e323d43b3ef51816b4a8db82397e41e2e764c43d4e2bd2bb473de7339dbc1d2baff3b7bc9583fd53244e3281230ad57f9e20ea80ed28b2ca63227b2a911ade26e69697ca670b7160751a76691d6b40922c94baf195bac0ef95cef6ca8f810412fd084dcb188a593077c84e4d97dd04fabc990b3214d3b0d474c169b7d7171c"}, {0x78, 0x102, 0x2, "47b20f425d142b5bc37fd266c39f3c969c96b3b9261b91f46ff27f32c69e5635e98ce4d834efa56b61daa8f43cc98086badbbe1171dd36888c6c82ba1c018ffb1f4fddfdaae35eedd82083ca789c49475b1aa15876780251009cb646e935de6dbeb9d23dda54e5bd"}, {0xd8, 0x110, 0x5, "e3f4c76b41c370b0a43fad9b4ede1b2ad6c7ce6980591ad1e039920c11d94d84e22809dcad4e36144acd1b92c0f4cddc4c4cc95d1093c11fd7eb144b255ef2e414101a04ee7bd49cf3fc3f7c9ad9ddce5fc8ad57e1de8ca6f4a183b8215d19bf99e3976f24cef8480dc105f1d4f513d4bfc32d36a39970c4221c611acf580ac58419d29a86330e33db2a4296beb33a4f14b26faf2b33ce29cc7d09e5d2c2c6a9044c74a04879d1b47c1a8e012acde0200afd2f23ef3e4a3b8b783b70a35a727a0b7b6209"}, {0x108, 0x10c, 0x3, "76c60a79f8618e1f5a2960164fae63ac65e721b9476fae33f421f92c3969d75aa075bc68ff1dee7ecc892a76a4faae5d12f3b541102653ad2c06601cf181d41869f8d7bfc54d304f8199c70170bf21fcd27b877a336c42a68b523c67a7d93d837859b24ba2ee2209d4bdc201ee8052864cc0acd027c53d52f31685a2843aefb3c701db063efcf9b85adb8bd4fea14fa21de0581b01613b05b3c8e4eaba9a6cca389cf818257956889236963894c03912dc46727ce059e597502c59a619b53f1d8b8ce88fef5239a61d8f2004dc0cfae02e65e12f909596c2cb9991d8ee6a5aec3830c7708d06ccdc34c24936db7d97f9c4aab08c024120f7"}, {0xc0, 0x28a98f15ce309fcb, 0x8, "c012e97f5cc6102e73ad64de1fccda612e9d21955249a43a476fce866916ab5f752a7ece73cb71b2c787bdcb75ff74f0542fe28490115d704bbbf115fa3097eaf7cce930b692b588d4fa9ce572088ff4270a489cfbd6bcbc0454e302ffbb414caf79315e91591ac60e1cb403f020999d1ab129c3a54022a58b04ab37cded103f1ffd87250d83e29fdf03d4fba5243278aaf6a37180bf6a69fe1b38704d806acdf4a7278481ba55d693"}], 0x4b0}, 0x20000040) (async) socket$packet(0x11, 0x2, 0x300) (async) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) (async) pipe2$watch_queue(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002380), r6) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000023c0)={'wlan0\x00'}) (async) sendmsg$NL80211_CMD_JOIN_MESH(r8, &(0x7f0000002500)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002400)=ANY=[@ANYBLOB="12000000", @ANYRES16=r9, @ANYBLOB="10002abd7000fcdbdf254400000008000300", @ANYRES32, @ANYBLOB="0c009900020000003800000004002400040008010400bf0008000c000300000008000d00ffffffff74005a802c000280140005000500000002000400ff0105000800ff7f14000300030006000900dc000900ed0e040002001400008005000700000000000500060000000000300002801400050000001f0d8b4f0800ff7f0100020000000d0001003660032416040218060000000500070002000000"], 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x0) (async) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f0000002540)) (async) syz_genetlink_get_family_id$ipvs(&(0x7f00000025c0), r8) [ 59.138796][ T5340] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 59.147924][ T5340] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 59.159975][ T5329] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 59.181051][ T5329] team_slave_0: entered allmulticast mode 04:54:48 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) [ 59.204830][ T5329] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 59.221580][ T5340] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 59.230277][ T5340] System zones: 0-2, 18-18, 34-34 04:54:48 executing program 2: bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r3 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:54:48 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r6 = dup(0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0x3f, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x8db, 0x7f, 0x8, 0x4}]}) r3 = gettid() wait4(r3, 0x0, 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x909c0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r5, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{r6, r7/1000+10000}, {0x77359400}}) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, r2}]) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffe]}, 0x0, 0x8) io_submit(0x0, 0x0, &(0x7f00000002c0)) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000140)) [ 59.244547][ T5340] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 59.265948][ T5340] EXT4-fs (loop1): 1 truncate cleaned up 04:54:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2}, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:48 executing program 1: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x200040, &(0x7f0000000300)={[{@fat=@nfs_nostale_ro}, {@fat=@sys_immutable}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@nodots}, {@nodots}, {@fat=@nocase}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@errors_continue}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffb65}}, {@nodots}, {@nodots}]}, 0x1, 0x1b2, &(0x7f00000005c0)="$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") setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) [ 59.460593][ T5364] loop2: detected capacity change from 0 to 512 [ 59.470353][ T5364] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode 04:54:48 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r6}, 0x10) r7 = dup(0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 59.507543][ T5364] EXT4-fs (loop2): 1 truncate cleaned up [ 59.510876][ T5367] loop1: detected capacity change from 0 to 256 [ 59.517379][ T5364] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'. 04:54:48 executing program 2: bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r3 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 59.555788][ T5364] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 59.683282][ T5374] loop2: detected capacity change from 0 to 512 [ 59.709165][ T5374] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 59.718410][ T5374] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 59.745470][ T5374] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 59.755072][ T5374] System zones: 0-2, 18-18, 34-34 [ 59.766028][ T5374] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended 04:54:49 executing program 2: write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x100010e, &(0x7f0000001500)={[{@errors_remount}, {@grpjquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}, {@nogrpid}, {@block_validity}, {@noload}]}, 0x1, 0x444, &(0x7f0000000780)="$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") [ 59.801861][ T5374] EXT4-fs (loop2): 1 truncate cleaned up [ 59.947325][ T5377] loop2: detected capacity change from 0 to 512 [ 59.978470][ T5377] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode 04:54:49 executing program 2: syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ppoll(&(0x7f0000000800)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') lseek(r1, 0x300000002, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010700000000000000000500000008000300", @ANYRES64=r2], 0x1c}}, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) [ 60.008918][ T5377] EXT4-fs (loop2): 1 orphan inode deleted [ 60.014676][ T5377] EXT4-fs (loop2): 1 truncate cleaned up 04:54:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:49 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0xee0000b0}], 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:49 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 60.377432][ T5391] loop4: detected capacity change from 0 to 512 [ 60.407116][ T5391] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 60.416291][ T5391] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 04:54:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffdb1, 0x0, 0x0, 0x0, 0x3}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80000000, '\x00', r4, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x9a, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 04:54:49 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r6 = dup(0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:49 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:49 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 60.430843][ T5391] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 60.440879][ T5391] System zones: 0-2, 18-18, 34-34 [ 60.448285][ T5391] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 60.467472][ T5391] EXT4-fs (loop4): 1 truncate cleaned up 04:54:51 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$eJzs3V1rZGcdAPD/Oclks93UpOpFLbQWW8kW3ZmksW3woq0o3hWUer+GZBJCJpmQmbSbUCTFDyCIaMErr7wR/ACC9CPIwoJ7LyqK6K5eeKEeOTMnu9nxzCbBedkmvx+cM895zsv//ySbM8952XMCuLRejIi3I2IiIl6JiNmiPi2GOOoO+XL3732wmg/5nHf/mkRS1PVu81qx2nT3o1Tr4HBrpdGo7xXTtfb2bq11cHhjc3tlo75R31laWnx9+Y3l15YXBtLOvF1vfuOPP/7Bz7/55q+//P7vbv75+vfy/L9ezC9rxyDc7Ywr+c/igcmI2BtGsDGYKNpTGXciAACcSd7H/3REfKHT/5+NiU5vrqO3Szc9+uwAAACAQcjemol/JREZAAAAcGG9FREzkaTV4l6AmUjTarV7D+9n46m00Wy1v7Te3N9Zy+dFzEUlXd9s1BeKe2rnopLk04ud8sPpV3umlyLimYj40ezVznR1tdlYG/fJDwAAALgkrvUc//9jtnv8DwAAAFwwc+NOAAAAABi6fsf/yYjzAAAAAIan3/H/lRHnAQAAAAzFt955Jx+y4/dfr713sL/VfO/GWr21Vd3eX62uNvd2qxvN5kbnmX3bp22v0WzufiV29m/V2vVWu9Y6OLy53dzfad/c9P5AAAAAGJdnPv/x3SQijr56tTPkpvLRRJ8VPCsALoz0PAv/YXh5AKPX72seuPgmx50AMD5H404AGLdHHvVR0ik4efNOenLh3wwxKQAAYKDmP1d+/T8/BKiMOzlgqM51/R+4UFz/h8vrnNf/bw8rD2D0KnoAcOmd9qqPvg/vKLv+P1W2YJadui0AAGCoZjrjJK0W1wJnIk2r1YinO//Vv5KsbzbqCxHxqYj47WzlSj692F3H6wEBAAAAAAAAAAAAAAAAAAAAAAAA4IyyLIkMAAAAuNAi0j8lxfu/5mdfnuk9PzCV/HM2ild6vf/Td39ya6Xd3lvM6//2oL79UVH/6jjOYAAAAAC9jo/Tj4/jAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGCQ7t/7YLUYpkYZ9y9fi4i5R+KvdudMxnTnczoqEfHU35OYPLFeEhETA4h/9GFEPFsWP8nTirkii974aURcHU3857MsK41/bQDx4TL7ON//vF3295fGi53P8r//yWL4f/Xf/6UP9n8TffZ/T58xxnN3flnrG//DiOcmy/c/x/GTPvFfKttgyQ/lu985PPyfyu7GI/tZxHyUxz8Zq9be3q21Dg5vbG6vbNQ36jtLS4uvL7+x/NryQm19s1EvxqVt/OHzv/pPT9W/s65O+6NP/LlT2v9yXqicqMx6wxTB7ty695lusdKziU786y+V//6ffUz8/N/EF4vvgXz+/HH5qFs+6YVf3H6hNLEi/lqf9p/2+7/eb6M9Xvn2939/xkUBgBFoHRxurTQa9b2hFz7KsmxUsRTOXzju3Q0txPST0tJPYuFKRIwu6CDObAEAAE+ah53+cWcCAAAAAAAAAAAAAAAAAAAAl1frINJhP06sN+bReJoKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBY/w0AAP//N23b4Q==") 04:54:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0xee0000b0}], 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:51 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r5 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r6}, 0x10) r7 = dup(r5) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) [ 61.785715][ T5409] loop3: detected capacity change from 0 to 512 [ 61.794421][ T5409] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 61.803462][ T5409] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 61.827811][ T5409] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] 04:54:51 executing program 2: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x227a, 0x300000000000000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) (async) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="410023010000340200000200000008000100", @ANYRES32=r1, @ANYBLOB], 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) (async) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000680)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0x2b, "3c3beec96792c694d9e1848bbac64cf3ad6b17b6434a0d2fa65bca431be3abac9041d3310baf4e47f5ace9"}}}, 0x3f) read$nci(r0, &(0x7f0000000380)=""/98, 0x62) (async) read$nci(r0, &(0x7f0000000380)=""/98, 0x62) write$nci(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="41759100"], 0x4) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x80a, 0x0) (async) socket(0x11, 0x80a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1842, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'wg2\x00', 0x4801}) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) (async) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) sendmsg$NFC_CMD_START_POLL(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100023010000340200000600000008000100", @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) 04:54:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 61.844615][ T5409] System zones: 0-2, 18-18, 34-34 [ 61.855852][ T5409] EXT4-fs warning (device loop3): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 61.916678][ T3733] ------------[ cut here ]------------ [ 61.922154][ T3733] WARNING: CPU: 0 PID: 3733 at kernel/kcov.c:860 kcov_remote_start+0x326/0x380 [ 61.931105][ T3733] Modules linked in: [ 61.935012][ T3733] CPU: 0 PID: 3733 Comm: kworker/u8:8 Tainted: G W 6.9.0-rc4-syzkaller-00031-g96fca68c4fbf #0 [ 61.946695][ T3733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 61.956899][ T3733] Workqueue: nfc2_nci_cmd_wq nci_cmd_work [ 61.962619][ T3733] RIP: 0010:kcov_remote_start+0x326/0x380 [ 61.968424][ T3733] Code: b0 f1 28 00 4c 89 f7 e8 18 5f 2a 00 e9 21 fd ff ff 0f 8d 1b fd ff ff 4c 89 f7 be 03 00 00 00 e8 90 5d 89 00 e9 09 fd ff ff 90 <0f> 0b 90 65 48 8b 05 5f 9d d2 7e 41 f7 c4 00 02 00 00 0f 84 f0 fc [ 61.988053][ T3733] RSP: 0018:ffffc9000138bcf0 EFLAGS: 00010002 [ 61.994230][ T3733] RAX: 0000000080000000 RBX: 0000000000000003 RCX: 0000000000000002 [ 62.002256][ T3733] RDX: 0000000000000399 RSI: 0000000000000003 RDI: 0000000000000003 [ 62.010265][ T3733] RBP: 0000000000000003 R08: ffffffff84df8867 R09: 0000000000000000 [ 62.018244][ T3733] R10: 0001ffffffffffff R11: 0001c9000138bcd0 R12: 0000000000000246 [ 62.026204][ T3733] R13: ffff8881141ada00 R14: ffff8881180ed300 R15: ffff888119fe9080 [ 62.034237][ T3733] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 62.043154][ T3733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 62.049804][ T3733] CR2: 00007f3619b46f78 CR3: 0000000118496000 CR4: 00000000003506f0 [ 62.057768][ T3733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 62.065729][ T3733] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 62.073740][ T3733] Call Trace: [ 62.077032][ T3733] [ 62.079956][ T3733] ? __warn+0x13c/0x350 [ 62.084191][ T3733] ? report_bug+0x315/0x420 [ 62.088688][ T3733] ? kcov_remote_start+0x326/0x380 [ 62.093865][ T3733] ? handle_bug+0x3e/0x70 [ 62.098198][ T3733] ? exc_invalid_op+0x1a/0x50 [ 62.102883][ T3733] ? asm_exc_invalid_op+0x1a/0x20 [ 62.107900][ T3733] ? nci_cmd_work+0x77/0x1b0 [ 62.112536][ T3733] ? kcov_remote_start+0x326/0x380 [ 62.117666][ T3733] ? skb_dequeue+0xb7/0xd0 [ 62.122075][ T3733] nci_cmd_work+0x89/0x1b0 [ 62.126485][ T3733] process_scheduled_works+0x465/0x990 [ 62.132015][ T3733] worker_thread+0x526/0x730 [ 62.136650][ T3733] ? __pfx_worker_thread+0x10/0x10 [ 62.141776][ T3733] kthread+0x1d1/0x210 [ 62.145862][ T3733] ? __pfx_kthread+0x10/0x10 [ 62.150454][ T3733] ret_from_fork+0x4b/0x60 [ 62.154862][ T3733] ? __pfx_kthread+0x10/0x10 [ 62.159450][ T3733] ret_from_fork_asm+0x1a/0x30 [ 62.164244][ T3733] [ 62.167313][ T3733] ---[ end trace 0000000000000000 ]--- [ 62.178025][ T5424] loop4: detected capacity change from 0 to 512 [ 62.185460][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 62.185471][ T28] audit: type=1400 audit(1713243291.536:1735): avc: denied { unlink } for pid=2766 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 62.218732][ T5424] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 62.232185][ T5409] EXT4-fs (loop3): 1 truncate cleaned up [ 62.234518][ T5424] EXT4-fs (loop4): 1 truncate cleaned up [ 62.249868][ T5424] selinux_netlink_send: 2 callbacks suppressed [ 62.249881][ T5424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5424 comm=syz-executor.4 04:54:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002080), 0x101000, 0x0) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 04:54:51 executing program 1: arch_prctl$ARCH_SHSTK_UNLOCK(0x5004, 0x0) (async) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x1, 0x136, [0x20000240, 0x0, 0x0, 0x20000316, 0x20000346], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x11, 0x82, 0x19, 'veth1_to_team\x00', 'veth0_to_batadv\x00', 'veth0_to_bond\x00', 'ipvlan0\x00', @random="e41e3fce02ec", [0x7f, 0x0, 0xff, 0x0, 0x0, 0xff], @random="824a80d6eca8", [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0xa6, [], [], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1ae) (async) setsockopt$MRT_ADD_MFC(r1, 0x0, 0xcc, &(0x7f0000000040)={@broadcast, @empty, 0x0, "a679ec505027c2bdcca2a3a418ae12cdeda4d6ed1dd59b1e61cf41cfd3eb302f"}, 0x3c) (async) setsockopt$MRT_INIT(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e21, @remote}}) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',defcontext=\"@']) (async) getdents64(0xffffffffffffffff, 0xffffffffffffffff, 0x43) sendto$packet(0xffffffffffffffff, &(0x7f0000000100)="8915c2d53b46edf6ea313d135fc916def9edbf2eff913693a0373e6a8ee9ff8400fb35796229d8d528278371f9c1d9757734c82621ea5d7851b8d409d380142ac5ac3ffc0158e680be8f853c4c5e0c08a8e286025d74180c21ed8a041fd827c330c8aed83231c9d16674876156b44d570cc5c0daedac8eb468c4d2c01e2dbd599839f1a813b39046cf2927e22b108e9fe1b89cc3bc8f9fdb1d3765f5a74da34ca473027149d5f820012de0821960a48dcb07138371e2c71f4342efd4f1cc1ec7b740545b5c8948e7e028bbf623a901b2119c", 0xd2, 0x4, 0x0, 0x0) (async) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xcd, &(0x7f00000000c0)={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, "790a6f2edf14931537946e962762915d19d2c8e629373b26fb4aaa55d046ceeb"}, 0x3c) (async) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000480)={{0x3a, @broadcast, 0x4e23, 0x1, 'ovf\x00', 0x5, 0xfffffffd, 0x13}, {@private=0xa010101, 0x4e24, 0x3, 0x5, 0x66, 0x7}}, 0x44) (async) ptrace$ARCH_SHSTK_ENABLE(0x6, r0, 0x0, 0x5001) [ 62.269997][ T5419] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 62.279578][ T5424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5424 comm=syz-executor.4 [ 62.305691][ T5424] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 04:54:51 executing program 2: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:51 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000240)={[{@noload}, {@mblk_io_submit}, {@grpid}, {@abort}, {@block_validity}, {@quota}]}, 0x3, 0x434, &(0x7f00000002c0)="$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") timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) [ 62.316847][ T5424] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0xee0000b0}], 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:51 executing program 4: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_page_alloc\x00', r0}, 0x10) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000180)) r2 = socket(0x23, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110040", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000006100c0ff00000000bf91000000000000b7020000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x8, 0xfc, &(0x7f00000009c0)=""/252}, 0x90) r3 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r4 = io_uring_setup(0x71a5, &(0x7f0000000440)={0x0, 0x5974, 0x8, 0x1, 0x4}) r5 = epoll_create1(0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0xa847, "4bfc77"}, 0x6) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) dup3(r5, r4, 0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) listen(r7, 0x0) accept4$phonet_pipe(r7, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6092df1f00442f00fe8000000000000000000000000000bbfe8000000000000000000000000000aa"], 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$rds(r2, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000200), 0x4) close_range(r0, r1, 0x2) bind$l2tp(r2, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='nfs4\x00', 0x0, &(0x7f00000001c0)='\x01') r8 = syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, &(0x7f0000000100), &(0x7f0000000280)) io_uring_enter(r8, 0x3baa, 0x0, 0x0, 0x0, 0x0) socket(0x2, 0x80805, 0x0) [ 62.385409][ T5436] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 62.561995][ T28] audit: type=1400 audit(1713243291.886:1736): avc: denied { accept } for pid=5444 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 04:54:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r8, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x32}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r10 = socket$packet(0x11, 0x2, 0x300) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)={0x38, r12, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r9, &(0x7f0000001880)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001840)={&(0x7f0000000f80)={0x340, r12, 0x1, 0x70bd28, 0x0, {}, [@TIPC_NLA_NODE={0x164, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_NODE_ID={0x7e, 0x3, "f1c176be7e215a812dc35015259029b743ffbd9cc62a9c6cb4c477b98da95aed692d6b27eb444ec0ba13df3d6905631f8155d46bedff4a777340308c6578db7191fab5ffd00d3704af1f93ea9e1e3a9dbde2a35ee17c817bc3c55aa51e40818b3ee09c88d63714e9b81b3389880c63ffe6fccc0b0a58fa7572c0"}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x401}, @TIPC_NLA_NODE_ID={0xb9, 0x3, "e7bfc05c591fc100b09b1d78c20031c85c52c832f038666113529df5635593a67ad2fff9370ae52e7e7f271f187f33eddb4dd604500e82b242b83fd6d90ba386d2c0b10cda688e50a7f238daa06443c8238d5b8facc2ccd3f104ce32e2d174cc409d52059dcad8091d077a5e077270f953ac00dd10f7fc037750d71d49db212fe7e380f458c154871a13ca01e87a580d2b6441ec529536af19a5b750f327e78e9b6973682d49fd5ec63bcb2043adc472af5cd48dd9"}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @private2, 0x7fffffff}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA={0x90, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd935}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}]}, @TIPC_NLA_SOCK={0x84, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff0001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x62}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xa194}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f0614f1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f000000}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xd0}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x20000000}, 0x40090) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000000c0)={'veth1_to_team\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000dc0), 0x68}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getneightbl={0x14, 0x42, 0x1, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}}, 0x8000) [ 62.647274][ T5448] loop2: detected capacity change from 0 to 512 [ 62.653711][ T5448] EXT4-fs: Ignoring removed mblk_io_submit option [ 62.656802][ T5446] loop3: detected capacity change from 0 to 512 [ 62.736578][ T5453] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 62.763802][ T28] audit: type=1400 audit(1713243291.946:1737): avc: denied { bind } for pid=5444 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 62.766621][ T5448] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 62.783704][ T28] audit: type=1400 audit(1713243292.086:1738): avc: denied { connect } for pid=5452 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 04:54:52 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 62.877802][ T5446] EXT4-fs (loop3): blocks per group (95) and clusters per group (32768) inconsistent 04:54:52 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 63.074478][ T5456] loop1: detected capacity change from 0 to 512 [ 63.147060][ T5458] loop0: detected capacity change from 0 to 512 [ 63.165023][ T5456] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 63.174200][ T5456] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 63.246471][ T5448] EXT4-fs (loop2): 1 truncate cleaned up [ 63.255946][ T5458] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 63.265211][ T5458] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 63.265476][ T5456] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 63.278919][ T5458] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 63.281715][ T5456] System zones: 0-2, 18-18, 34-34 04:54:52 executing program 1: bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r3 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:52 executing program 4: ioperm(0x0, 0x1, 0x1) keyctl$unlink(0x7, 0x0, 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file1\x00', 0x0) [ 63.295053][ T5456] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 63.309582][ T5458] System zones: 0-2, 18-18, 34-34 [ 63.315862][ T5458] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 63.315871][ T5456] EXT4-fs (loop1): 1 truncate cleaned up [ 63.339518][ T5458] EXT4-fs (loop0): 1 truncate cleaned up 04:54:52 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r7) close(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r8, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000900)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x3, 0x7, &(0x7f0000000a80)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000341200007b8af8ff00000000bfa20000000000000702000020ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:54:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x38, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x6, 0x2a, [@random]}]}, 0x24}}, 0x0) 04:54:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:52 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x10, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:52 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$eJzs3V1rZGcdAPD/Oclks93UpOpFLbQWW8kW3ZmksW3woq0o3hWUer+GZBJCJpmQmbSbUCTFDyCIaMErr7wR/ACC9CPIwoJ7LyqK6K5eeKEeOTMnu9nxzCbBedkmvx+cM895zsv//ySbM8952XMCuLRejIi3I2IiIl6JiNmiPi2GOOoO+XL3732wmg/5nHf/mkRS1PVu81qx2nT3o1Tr4HBrpdGo7xXTtfb2bq11cHhjc3tlo75R31laWnx9+Y3l15YXBtLOvF1vfuOPP/7Bz7/55q+//P7vbv75+vfy/L9ezC9rxyDc7Ywr+c/igcmI2BtGsDGYKNpTGXciAACcSd7H/3REfKHT/5+NiU5vrqO3Szc9+uwAAACAQcjemol/JREZAAAAcGG9FREzkaTV4l6AmUjTarV7D+9n46m00Wy1v7Te3N9Zy+dFzEUlXd9s1BeKe2rnopLk04ud8sPpV3umlyLimYj40ezVznR1tdlYG/fJDwAAALgkrvUc//9jtnv8DwAAAFwwc+NOAAAAABi6fsf/yYjzAAAAAIan3/H/lRHnAQAAAAzFt955Jx+y4/dfr713sL/VfO/GWr21Vd3eX62uNvd2qxvN5kbnmX3bp22v0WzufiV29m/V2vVWu9Y6OLy53dzfad/c9P5AAAAAGJdnPv/x3SQijr56tTPkpvLRRJ8VPCsALoz0PAv/YXh5AKPX72seuPgmx50AMD5H404AGLdHHvVR0ik4efNOenLh3wwxKQAAYKDmP1d+/T8/BKiMOzlgqM51/R+4UFz/h8vrnNf/bw8rD2D0KnoAcOmd9qqPvg/vKLv+P1W2YJadui0AAGCoZjrjJK0W1wJnIk2r1YinO//Vv5KsbzbqCxHxqYj47WzlSj692F3H6wEBAAAAAAAAAAAAAAAAAAAAAAAA4IyyLIkMAAAAuNAi0j8lxfu/5mdfnuk9PzCV/HM2ild6vf/Td39ya6Xd3lvM6//2oL79UVH/6jjOYAAAAAC9jo/Tj4/jAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGCQ7t/7YLUYpkYZ9y9fi4i5R+KvdudMxnTnczoqEfHU35OYPLFeEhETA4h/9GFEPFsWP8nTirkii974aURcHU3857MsK41/bQDx4TL7ON//vF3295fGi53P8r//yWL4f/Xf/6UP9n8TffZ/T58xxnN3flnrG//DiOcmy/c/x/GTPvFfKttgyQ/lu985PPyfyu7GI/tZxHyUxz8Zq9be3q21Dg5vbG6vbNQ36jtLS4uvL7+x/NryQm19s1EvxqVt/OHzv/pPT9W/s65O+6NP/LlT2v9yXqicqMx6wxTB7ty695lusdKziU786y+V//6ffUz8/N/EF4vvgXz+/HH5qFs+6YVf3H6hNLEi/lqf9p/2+7/eb6M9Xvn2939/xkUBgBFoHRxurTQa9b2hFz7KsmxUsRTOXzju3Q0txPST0tJPYuFKRIwu6CDObAEAAE+ah53+cWcCAAAAAAAAAAAAAAAAAAAAl1frINJhP06sN+bReJoKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBY/w0AAP//N23b4Q==") [ 63.439043][ T5471] syzkaller1: entered promiscuous mode [ 63.443928][ T28] audit: type=1400 audit(1713243292.786:1739): avc: denied { read } for pid=5469 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 63.444579][ T5471] syzkaller1: entered allmulticast mode [ 63.502146][ T5477] loop1: detected capacity change from 0 to 512 [ 63.518109][ T5477] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 63.527274][ T5477] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 63.536799][ T5477] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 63.545617][ T5477] System zones: 0-2, 18-18, 34-34 04:54:52 executing program 0: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x200040, &(0x7f0000000300)={[{@fat=@nfs_nostale_ro}, {@fat=@sys_immutable}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@nodots}, {@nodots}, {@fat=@nocase}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@errors_continue}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffb65}}, {@nodots}, {@nodots}]}, 0x1, 0x1b2, &(0x7f00000005c0)="$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") setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x4) [ 63.549553][ T28] audit: type=1400 audit(1713243292.896:1740): avc: denied { mount } for pid=5469 comm="syz-executor.0" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 63.574482][ T5477] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 63.590868][ T5477] EXT4-fs (loop1): 1 truncate cleaned up 04:54:52 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") 04:54:52 executing program 3: r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syncfs(r0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="250a000000000000560e38b7a427985645b0bbc54dd72bee880007000000180000000200000000000000000000809500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000180)) ioctl$PPPIOCSMAXCID(r2, 0x4004743b, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x250083, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x28000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000000, &(0x7f0000002e80), 0x1, 0x4f6, &(0x7f00000007c0)="$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") getpgrp(0x0) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000001900)) fstat(r1, &(0x7f0000002a00)) fstat(r0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x4, 0xbf27, 0x500}, 0x48) mmap(&(0x7f0000fa2000/0x3000)=nil, 0x3000, 0x7, 0x13, r7, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000f80)) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002d40)={0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r5, r4}}}, @cred={{0x1c, 0x1, 0x2, {r3, r6, r4}}}], 0x40}, 0x4000) tkill(r8, 0x26) process_vm_writev(r8, &(0x7f0000001880)=[{&(0x7f0000004800)=""/139, 0x8b}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/120, 0x78}, {&(0x7f0000001540)=""/139, 0x8b}, {&(0x7f0000001600)=""/227, 0xe3}, {&(0x7f0000001700)=""/251, 0xfb}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000001800)=""/87, 0x57}], 0x8, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000001a00)=""/63, 0x3f}, {&(0x7f0000001a80)=""/226, 0xe2}, {&(0x7f0000001b80)=""/243, 0xf3}, {&(0x7f0000001c80)=""/83, 0x53}, {&(0x7f0000000440)=""/15, 0xf}], 0x6, 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(r9, 0x4b32, 0xffffffffffffffff) sendmmsg$unix(r2, 0x0, 0x0, 0x0) getpid() syz_pidfd_open(0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 63.603716][ T28] audit: type=1400 audit(1713243292.946:1741): avc: denied { unmount } for pid=4890 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 04:54:53 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file1\x00', &(0x7f0000000080)={0x109000, 0x3, 0x20}, 0x18) syz_mount_image$vfat(&(0x7f0000003880), &(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x6, 0x2a3, &(0x7f0000000180)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000540)={'#! ', './file0'}, 0xb) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x86}) mknodat(r0, &(0x7f0000000000)='./file0/file1\x00', 0x8041, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file1\x00', 0x0) [ 63.646348][ T5481] loop0: detected capacity change from 0 to 256 [ 63.677412][ T5484] loop1: detected capacity change from 0 to 512 [ 63.680586][ T5485] loop3: detected capacity change from 0 to 512 [ 63.690083][ T5484] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 63.699195][ T5484] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 63.701484][ T5485] EXT4-fs (loop3): blocks per group (95) and clusters per group (32768) inconsistent [ 63.715199][ T5484] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 63.724963][ T5484] System zones: 0-2, 18-18, 34-34 [ 63.730742][ T5484] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended 04:54:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 63.731313][ T5487] loop0: detected capacity change from 0 to 256 [ 63.745554][ T5484] EXT4-fs (loop1): 1 truncate cleaned up 04:54:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r8, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x32}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r10 = socket$packet(0x11, 0x2, 0x300) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)={0x38, r12, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r9, &(0x7f0000001880)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001840)={&(0x7f0000000f80)={0x340, r12, 0x1, 0x70bd28, 0x0, {}, [@TIPC_NLA_NODE={0x164, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_NODE_ID={0x7e, 0x3, "f1c176be7e215a812dc35015259029b743ffbd9cc62a9c6cb4c477b98da95aed692d6b27eb444ec0ba13df3d6905631f8155d46bedff4a777340308c6578db7191fab5ffd00d3704af1f93ea9e1e3a9dbde2a35ee17c817bc3c55aa51e40818b3ee09c88d63714e9b81b3389880c63ffe6fccc0b0a58fa7572c0"}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x401}, @TIPC_NLA_NODE_ID={0xb9, 0x3, "e7bfc05c591fc100b09b1d78c20031c85c52c832f038666113529df5635593a67ad2fff9370ae52e7e7f271f187f33eddb4dd604500e82b242b83fd6d90ba386d2c0b10cda688e50a7f238daa06443c8238d5b8facc2ccd3f104ce32e2d174cc409d52059dcad8091d077a5e077270f953ac00dd10f7fc037750d71d49db212fe7e380f458c154871a13ca01e87a580d2b6441ec529536af19a5b750f327e78e9b6973682d49fd5ec63bcb2043adc472af5cd48dd9"}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @private2, 0x7fffffff}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA={0x90, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd935}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}]}, @TIPC_NLA_SOCK={0x84, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff0001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x62}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xa194}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f0614f1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f000000}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xd0}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x20000000}, 0x40090) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000000c0)={'veth1_to_team\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000dc0), 0x68}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getneightbl={0x14, 0x42, 0x1, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}}, 0x8000) 04:54:53 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r7) close(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r8, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000900)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x3, 0x7, &(0x7f0000000a80)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000341200007b8af8ff00000000bfa20000000000000702000020ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 63.823447][ T5491] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 63.858807][ T5494] loop1: detected capacity change from 0 to 512 04:54:53 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 63.868251][ T5494] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 63.880174][ T5494] EXT4-fs (loop1): 1 truncate cleaned up [ 63.888578][ T5494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5494 comm=syz-executor.1 [ 63.902043][ T5494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5494 comm=syz-executor.1 [ 63.917210][ T5494] 9pnet_fd: Insufficient options for proto=fd 04:54:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) [ 63.923519][ T5494] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 63.939053][ T5494] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 63.961326][ T5499] loop0: detected capacity change from 0 to 512 04:54:53 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 63.973242][ T5499] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 63.982338][ T5499] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 63.999143][ T5499] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 64.007373][ T5499] System zones: 0-2, 18-18, 34-34 04:54:53 executing program 0: bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r3 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) [ 64.013519][ T5499] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 64.030659][ T5499] EXT4-fs (loop0): 1 truncate cleaned up [ 64.049034][ T5504] syzkaller1: entered promiscuous mode [ 64.054558][ T5504] syzkaller1: entered allmulticast mode 04:54:53 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@local, @local, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000002ac1414aa0000000000000000"], 0x10) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa50b73184d72fd777a1bca245d5cde008004500acee2bb80028004300000002907800000000ffffffff7eb96411010078e00000020000000100"], 0x0) r1 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) 04:54:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r8, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:54:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)={0x28, 0x35, 0x1, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0x4, 0x1}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002180)='/sys/power/sync_on_suspend', 0xa82, 0x0) sendfile(r2, r2, 0x0, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, r2}, @generic={0x2c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x23, 0x1, 0x0, 0x0, {0x3}, [@nested={0x8, 0x1, 0x0, 0x1, [@generic="e139caec"]}]}, 0x1c}}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00'}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r4, 0x18000000000002a0, 0x204, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f11c72b", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 04:54:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 64.138035][ T28] audit: type=1400 audit(1713243293.486:1742): avc: denied { search } for pid=5507 comm="syz-executor.0" name="/" dev="configfs" ino=1318 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 64.165412][ T5510] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 64.188489][ T5512] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 64.203944][ T5514] loop1: detected capacity change from 0 to 512 [ 64.217228][ T5514] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 64.230850][ T5514] EXT4-fs (loop1): 1 truncate cleaned up [ 64.238575][ T5514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5514 comm=syz-executor.1 [ 64.251893][ T5514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5514 comm=syz-executor.1 [ 64.266102][ T5514] 9pnet_fd: Insufficient options for proto=fd [ 64.272395][ T5514] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r7) close(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r8, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000900)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x3, 0x7, &(0x7f0000000a80)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000341200007b8af8ff00000000bfa20000000000000702000020ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:54:53 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r5 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) r6 = dup(r5) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 64.282795][ T5514] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:53 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x2) r5 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r6}, 0x10) r7 = dup(r5) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:54:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) [ 64.519289][ T5524] syzkaller1: entered promiscuous mode [ 64.524896][ T5524] syzkaller1: entered allmulticast mode 04:54:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r7) close(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r8, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000900)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x3, 0x7, &(0x7f0000000a80)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000341200007b8af8ff00000000bfa20000000000000702000020ffffffb703000008000000b70400000200000085000000820000009500000000000000"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:54:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7, 0x12, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001280)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0xff}}, 0x28}}, 0x0) ftruncate(r0, 0x8979) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40081271, &(0x7f0000001080)) arch_prctl$ARCH_SHSTK_UNLOCK(0x5004, 0x0) r3 = syz_clone(0x51005200, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000018000900000000e6ff0000001c"], 0x24}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r6, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r6, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) ptrace(0x10, r3) ptrace$ARCH_SHSTK_ENABLE(0x6, r3, 0x1, 0x5001) 04:54:54 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:54:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:54 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) [ 65.411024][ T28] audit: type=1400 audit(1713243294.756:1743): avc: denied { create } for pid=5526 comm="syz-executor.0" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 [ 65.413009][ T5534] loop4: detected capacity change from 0 to 512 [ 65.441587][ T5530] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:54:54 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 04:54:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) [ 65.450370][ T28] audit: type=1400 audit(1713243294.786:1744): avc: denied { read } for pid=5526 comm="syz-executor.0" name="file0" dev="sda1" ino=1968 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 [ 65.473458][ T5534] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode 04:54:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffdb1, 0x0, 0x0, 0x0, 0x3}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0xda, &(0x7f00000004c0)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "3000bb", 0x64, 0x2b, 0x0, @private2, @local, {[], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "1307e73f6bd180c6c28ea99847426247dd0f07b01145b62caf2bb71b0d9af7a2", "fbe6e64a95ddf525e3ad00dc230cfec1", {"8bbc3e48c257c6068589b0549a1d3cb0", "143c63e79ac202a126b983163569237a"}}}}}}}}, 0x0) 04:54:54 executing program 2: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x200040, &(0x7f0000000100)={[{@fat=@nfs_nostale_ro}, {@fat=@sys_immutable}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@nodots}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '1250'}}, {@nodots}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@nocase}, {@dots}, {@dots}, {@fat=@quiet}, {@dots}, {@nodots}, {@nodots}, {@nodots}]}, 0x1, 0x1b2, &(0x7f00000005c0)="$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") setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) [ 65.505064][ T5534] EXT4-fs (loop4): 1 truncate cleaned up [ 65.510742][ T5534] EXT4-fs mount: 57 callbacks suppressed [ 65.510752][ T5534] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:54:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:54 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) sendmsg$tipc(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r5}, 0x10) r6 = dup(r4) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 65.553265][ T5534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5534 comm=syz-executor.4 [ 65.611449][ T5549] loop2: detected capacity change from 0 to 256 [ 65.622107][ T5548] syzkaller1: entered promiscuous mode [ 65.627620][ T5548] syzkaller1: entered allmulticast mode [ 65.658237][ T5534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5534 comm=syz-executor.4 [ 65.677355][ T5549] FAT-fs (loop2): codepage cp1250 not found [ 65.678199][ T5534] 9pnet_fd: Insufficient options for proto=fd [ 65.692899][ T5534] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 04:54:55 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) 04:54:55 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:55 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @private1}}, {{0xa, 0x0, 0x800, @ipv4={'\x00', '\xff\xff', @empty}}}}, 0x108) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000250000002300000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000080), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x8, &(0x7f0000000480)={{0x1, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f0000000000003490f82bf77b2a82a671c1209e6e873b9a19135d607149c68d0daa96906e4da3c227a9acb2c3375c46c0ba56dc4f8d9d38b589d9186011473191ed5f2a8ed07eeacc55e3f2ab18e97b0ec7bf5ba59d120dc6aa8139383d1a56ae44e6f30032482a4f1160b92532ba84de32848e8944e29e7ff15ad8901a8d04"], 0x0, 0x26}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0cb97907081175f37538e486dd"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0cb97907081175f37538e486dd"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000001600000000000000ae330018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000001600000000000000ae330018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) dup2(r4, r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={&(0x7f00000001c0)="372c979854ca2c", 0x0, 0x0, 0x0}, 0x38) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0xffbf) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r6, 0x8982, &(0x7f0000000080)={0x0, 'pimreg0\x00', {0x4}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x1279, &(0x7f0000001080)) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x1279, &(0x7f0000001080)) open$dir(&(0x7f0000000100)='./file0\x00', 0x149800, 0x0) (async) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x149800, 0x0) epoll_create1(0x0) (async) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f00000000c0)) r9 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r9) (async) close(r9) 04:54:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file1\x00', 0x81c0, 0x40000) 04:54:55 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 65.705235][ T5534] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 65.737300][ T4848] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:54:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r7) close(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r8, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) 04:54:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3, 0x1, 0x2}}, 0x20) 04:54:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:55 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:55 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 65.892767][ T5573] loop4: detected capacity change from 0 to 512 [ 65.902724][ T5573] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 65.920140][ T5573] EXT4-fs (loop4): 1 truncate cleaned up [ 65.925874][ T5573] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:54:55 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000080)={[{@noload}, {@orlov}, {@bsdgroups}]}, 0x1, 0x640, &(0x7f0000000140)="$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") openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setrlimit(0x700, &(0x7f0000000000)) [ 65.945661][ T5573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5573 comm=syz-executor.4 [ 65.962196][ T5573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5573 comm=syz-executor.4 [ 65.983534][ T5573] 9pnet_fd: Insufficient options for proto=fd [ 65.985283][ T5581] loop2: detected capacity change from 0 to 1024 04:54:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x60, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x6, 0x2a, [@random]}]}, 0x24}}, 0x0) [ 65.991017][ T5573] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 65.997348][ T5581] EXT4-fs: Ignoring removed orlov option [ 66.012797][ T5573] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 66.013523][ T5581] EXT4-fs (loop2): filesystem is read-only [ 66.034728][ T5581] EXT4-fs (loop2): #clusters per group too big: 8193 04:54:55 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) r3 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r4}, 0x10) r5 = dup(r3) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 66.043224][ T4848] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:54:55 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x0, 0x3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x3, 0x2}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f00000000c0), 0x1, 0x49b, &(0x7f0000000100)="$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") sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) syz_clone3(&(0x7f0000000680)={0x100080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:54:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x200200, 0xc) getdents64(r1, &(0x7f0000000200)=""/29, 0x1d) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000002200000c0000000000feff00760000000f00000045000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r2}, 0x10) r3 = syz_io_uring_setup(0x72c1, &(0x7f0000000000)={0x0, 0x0, 0x400}, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r3, 0xb, &(0x7f0000000440)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x17}, @ioring_restriction_sqe_op={0x1, 0x8}], 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth1_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000000c0)={@mcast2={0xff, 0x5}, @private2, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000002}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r7, &(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) connect$inet(r7, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000240)=[@timestamp], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f00000001c0), 0xc7) sendto$inet(r7, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4211eca1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs$pagemap(0x0, &(0x7f0000000040)) ioctl$PAGEMAP_SCAN(r8, 0xc0606610, &(0x7f00000004c0)={0x60, 0x0, &(0x7f00007e9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0}) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4c0000001000370400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800e00010069703665727370616e000000188e02800400120008000400000000000800020000000000"], 0x4c}}, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000300)=0x2, 0x4) [ 66.148062][ T5589] loop2: detected capacity change from 0 to 512 [ 66.158045][ T5591] veth1_vlan: entered allmulticast mode [ 66.167454][ T5589] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 66.174051][ T5589] EXT4-fs (loop2): mount failed 04:54:55 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002080), 0x101000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 04:54:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 66.197183][ T5591] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 04:54:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 66.251724][ T5595] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 66.286335][ T5598] loop4: detected capacity change from 0 to 512 [ 66.297510][ T5598] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 66.310727][ T5598] EXT4-fs (loop4): 1 truncate cleaned up [ 66.316531][ T5598] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.334676][ T5598] 9pnet_fd: Insufficient options for proto=fd [ 66.340955][ T5598] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 66.351467][ T5598] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:55 executing program 4: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) [ 66.456137][ T4848] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 66.516407][ T5602] loop2: detected capacity change from 0 to 512 04:54:56 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 66.664741][ T5602] EXT4-fs (loop2): blocks per group (95) and clusters per group (32768) inconsistent 04:54:56 executing program 0: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:56 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) 04:54:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @multicast2}, 0xf7fffffe}}, 0x2e) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:54:56 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) [ 67.100296][ T5611] syzkaller1: entered promiscuous mode [ 67.105820][ T5611] syzkaller1: entered allmulticast mode [ 67.128162][ T5617] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 04:54:56 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x0, 0x3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x3, 0x2}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f00000000c0), 0x1, 0x49b, &(0x7f0000000100)="$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") sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) syz_clone3(&(0x7f0000000680)={0x100080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:54:56 executing program 3: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:56 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:54:56 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:54:56 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r3}, 0x10) r4 = dup(r2) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 67.148083][ T5617] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:54:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) [ 67.241158][ T5623] loop0: detected capacity change from 0 to 512 [ 67.259593][ T5633] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. [ 67.266721][ T5623] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 67.277029][ T5623] EXT4-fs (loop0): mount failed 04:54:56 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) [ 67.396098][ T5641] loop4: detected capacity change from 0 to 512 [ 67.458432][ T5643] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 67.495133][ T5641] EXT4-fs (loop4): blocks per group (95) and clusters per group (32768) inconsistent [ 67.584223][ T5643] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:54:57 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c010000130a010800000000ddffffff0100000804010800f64ef5892fb066c272531ef42229faae8da610e752ad9ee9deec5f68037c1adf39df29ac48fd6b5f7df8df128c4124fb18f160cffffabebf2ada67fd77ec4a4691b0dc50f445f050dee30f64faffaa3ca4bb699d00f1601c8a9aaf83a8b5645dfac8ad3a85860ea368ae81e317cc2a834586c363d5ef7f000000000000000000000000000000009e039568c928fdab32b58ffd56d5a170e9f5ed710597b1f12db50562a4420bf316e079622a056a62191a757302069cee76ff1de1d891e6b6dcd15c37ba6d5590f0578d93472f12bf29fab479fbaf34ecaf4a54eef4c289d7d1cd0ae6ad8c08000340000000080c0006400000000000000003000000ff32a9fe795557c9f83b3a0867a72e"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) [ 67.957452][ T5645] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 04:54:57 executing program 2: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) [ 68.047262][ T5645] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:54:57 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r7) close(r7) openat2(0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) 04:54:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'pim6reg\x00'}) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:54:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:57 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000016c0)) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001340)={0x40, 0x0, 0x1}, 0x1e) r3 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) r4 = dup(r3) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 68.175500][ T5654] loop1: detected capacity change from 0 to 512 [ 68.182001][ T5651] syzkaller1: entered promiscuous mode [ 68.187568][ T5651] syzkaller1: entered allmulticast mode [ 68.195628][ T5654] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 68.218904][ T5654] EXT4-fs (loop1): 1 truncate cleaned up 04:54:57 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) [ 68.225040][ T5654] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:54:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:57 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) [ 68.292193][ T5654] selinux_netlink_send: 2 callbacks suppressed [ 68.292208][ T5654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5654 comm=syz-executor.1 04:54:57 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000600)=""/274, 0xffffff4f, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r3}, 0x10) r4 = dup(r2) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 68.342356][ T5654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5654 comm=syz-executor.1 [ 68.379293][ T5654] 9pnet_fd: Insufficient options for proto=fd 04:54:57 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) [ 68.397087][ T5654] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:57 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x0, 0x3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="61158800000000006113500000000000bfa000000000000007000000ee0016055e03010000000000250500000000000069163e0000000000bf07000000000000260507000fff0720670600003f000000140600000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2474ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c71"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x3, 0x2}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f00000000c0), 0x1, 0x49b, &(0x7f0000000100)="$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") sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) syz_clone3(&(0x7f0000000680)={0x100080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:54:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) [ 68.452255][ T5678] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 68.466348][ T3621] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 68.628888][ T5683] loop1: detected capacity change from 0 to 512 [ 68.647606][ T5683] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 68.654372][ T5683] EXT4-fs (loop1): mount failed [ 68.685428][ T5685] loop2: detected capacity change from 0 to 512 [ 68.709775][ T5685] EXT4-fs (loop2): blocks per group (95) and clusters per group (32768) inconsistent 04:54:58 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) 04:54:58 executing program 3: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000064790000b7030000000003808500000083000000bc09000000000000e5090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095000000000000002b645228decca92745e06985251167ade62d7d0c03517e946ad50159e70e73eba33c2d71cb2195a6692ce335a7f5d1b39776c1"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:54:58 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 69.304969][ T5697] loop4: detected capacity change from 0 to 512 04:54:58 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c010000130a010800000000ddffffff0100000804010800f64ef5892fb066c272531ef42229faae8da610e752ad9ee9deec5f68037c1adf39df29ac48fd6b5f7df8df128c4124fb18f160cffffabebf2ada67fd77ec4a4691b0dc50f445f050dee30f64faffaa3ca4bb699d00f1601c8a9aaf83a8b5645dfac8ad3a85860ea368ae81e317cc2a834586c363d5ef7f000000000000000000000000000000009e039568c928fdab32b58ffd56d5a170e9f5ed710597b1f12db50562a4420bf316e079622a056a62191a757302069cee76ff1de1d891e6b6dcd15c37ba6d5590f0578d93472f12bf29fab479fbaf34ecaf4a54eef4c289d7d1cd0ae6ad8c08000340000000080c0006400000000000000003000000ff32a9fe795557c9f83b3a0867a72e"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) [ 69.375367][ T5697] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 69.397544][ T5697] EXT4-fs (loop4): 1 truncate cleaned up [ 69.403257][ T5697] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:54:58 executing program 2: bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) 04:54:58 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r7, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) [ 69.418054][ T5704] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 69.423504][ T5702] loop3: detected capacity change from 0 to 512 [ 69.457168][ T5702] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended 04:54:58 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) [ 69.460740][ T5697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5697 comm=syz-executor.4 [ 69.466245][ T5702] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 69.488654][ T5697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5697 comm=syz-executor.4 [ 69.515154][ T5702] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 69.523426][ T5702] System zones: 0-2, 18-18, 34-34 [ 69.530375][ T5702] EXT4-fs warning (device loop3): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 69.546247][ T5702] EXT4-fs (loop3): 1 truncate cleaned up [ 69.546558][ T5697] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. 04:54:58 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) [ 69.551908][ T5702] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:54:58 executing program 0: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000064790000b7030000000003808500000083000000bc09000000000000e5090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095000000000000002b645228decca92745e06985251167ade62d7d0c03517e946ad50159e70e73eba33c2d71cb2195a6692ce335a7f5d1b39776c1"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r4, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:54:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) [ 69.597167][ T4848] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 69.628635][ T3093] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:54:59 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) syz_clone3(&(0x7f0000000540)={0x2100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000340)=0x0, {0x40}, &(0x7f0000000340), 0x0, &(0x7f0000001680)=""/4093, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4d5a10000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0xf, 0x1ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r8, r7, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r8, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000000), &(0x7f0000000040)=@tcp6=r6}, 0x20) syz_open_procfs(r5, &(0x7f00000005c0)='cpuset\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) [ 69.655954][ T5722] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 69.691922][ T5725] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 04:54:59 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:54:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r7, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) [ 69.802207][ T5730] loop0: detected capacity change from 0 to 512 04:54:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 69.925685][ T5730] EXT4-fs (loop0): blocks per group (95) and clusters per group (32768) inconsistent [ 70.047126][ T5734] loop3: detected capacity change from 0 to 512 [ 70.113707][ T5734] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode 04:54:59 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") [ 70.268996][ T5734] EXT4-fs (loop3): 1 truncate cleaned up [ 70.274736][ T5734] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 70.307541][ T5740] loop1: detected capacity change from 0 to 512 [ 70.356427][ T5734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5734 comm=syz-executor.3 04:54:59 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r3}, 0x10) r4 = dup(r2) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 70.416727][ T5734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5734 comm=syz-executor.3 [ 70.443764][ T5740] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 70.452829][ T5740] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 04:54:59 executing program 4: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000064790000b7030000000003808500000083000000bc09000000000000e5090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095000000000000002b645228decca92745e06985251167ade62d7d0c03517e946ad50159e70e73eba33c2d71cb2195a6692ce335a7f5d1b39776c1"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:54:59 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 70.502677][ T5740] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 70.510891][ T5740] System zones: 0-2, 18-18, 34-34 [ 70.517613][ T5740] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended 04:54:59 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) [ 70.557744][ T5740] EXT4-fs (loop1): 1 truncate cleaned up [ 70.564299][ T5740] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 70.570078][ T5734] __nla_validate_parse: 9 callbacks suppressed [ 70.570142][ T5734] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 04:54:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r4, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:54:59 executing program 3: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) 04:55:00 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 70.596278][ T5734] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 70.628125][ T3093] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 70.639922][ T5752] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 04:55:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:55:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r7, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) [ 70.656910][ T3621] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 70.691525][ T5761] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 04:55:00 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) 04:55:00 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 04:55:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize}], [], 0x6b}}) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) [ 70.719385][ T5761] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 04:55:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f00000003c0), 0xfe, 0x50e, &(0x7f0000000f80)="$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") 04:55:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000037005197f0ffffff250000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r3, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 70.786787][ T5770] loop1: detected capacity change from 0 to 512 [ 70.807176][ T5770] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 70.825517][ T5776] loop2: detected capacity change from 0 to 512 [ 70.834766][ T5770] EXT4-fs (loop1): 1 truncate cleaned up [ 70.840469][ T5770] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 70.845282][ T5776] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 70.861988][ T5776] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 70.866944][ T5779] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 04:55:00 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r2}, 0x10) r3 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 70.880656][ T5770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5770 comm=syz-executor.1 [ 70.880665][ T5776] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 70.880692][ T5776] System zones: [ 70.894743][ T5770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5770 comm=syz-executor.1 [ 70.901388][ T5776] 0-2, 18-18, 34-34 04:55:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) write(r3, &(0x7f0000000000)="02", 0x35a63c) [ 70.931621][ T5770] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 70.941043][ T5776] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1153: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 70.959107][ T5770] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 70.959390][ T5776] EXT4-fs (loop2): 1 truncate cleaned up 04:55:00 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r7, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) 04:55:00 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 04:55:00 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) [ 70.980852][ T5776] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 70.996858][ T3621] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 71.023096][ T3099] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:55:00 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb01500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r3, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 71.071036][ T5790] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 71.085671][ T5793] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 71.097273][ T5793] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 04:55:00 executing program 1: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:55:00 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) [ 71.123041][ T5798] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 04:55:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) [ 71.217915][ T5803] syzkaller1: entered promiscuous mode [ 71.223447][ T5803] syzkaller1: entered allmulticast mode [ 71.313573][ T5808] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 71.358707][ T5800] loop2: detected capacity change from 0 to 512 04:55:00 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r7, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) [ 71.493849][ T5800] EXT4-fs (loop2): blocks per group (95) and clusters per group (32768) inconsistent 04:55:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e020000000000000000"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:55:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r3, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 72.071928][ T2784] ================================================================== [ 72.080042][ T2784] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 72.087267][ T2784] [ 72.089594][ T2784] write to 0xffff888106ecd930 of 8 bytes by task 3289 on cpu 0: [ 72.097229][ T2784] dentry_unlink_inode+0x65/0x240 [ 72.102273][ T2784] d_delete+0x76/0xf0 [ 72.106269][ T2784] d_delete_notify+0x30/0xe0 [ 72.110866][ T2784] vfs_unlink+0x30b/0x3f0 [ 72.115214][ T2784] do_unlinkat+0x236/0x4c0 [ 72.119645][ T2784] __x64_sys_unlink+0x30/0x40 [ 72.124329][ T2784] x64_sys_call+0x286b/0x2d30 [ 72.129023][ T2784] do_syscall_64+0xcd/0x1d0 [ 72.133549][ T2784] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 72.139456][ T2784] [ 72.141779][ T2784] read to 0xffff888106ecd930 of 8 bytes by task 2784 on cpu 1: [ 72.149325][ T2784] step_into+0x123/0x810 [ 72.153580][ T2784] walk_component+0x169/0x230 [ 72.158261][ T2784] path_lookupat+0x10a/0x2b0 [ 72.162851][ T2784] filename_lookup+0x127/0x300 [ 72.167621][ T2784] user_path_at_empty+0x42/0x120 [ 72.172559][ T2784] do_readlinkat+0x92/0x210 [ 72.177059][ T2784] __x64_sys_readlink+0x47/0x60 [ 72.181910][ T2784] x64_sys_call+0x2613/0x2d30 [ 72.186598][ T2784] do_syscall_64+0xcd/0x1d0 [ 72.191115][ T2784] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 72.197039][ T2784] [ 72.199358][ T2784] value changed: 0xffff888103c47b40 -> 0x0000000000000000 [ 72.206469][ T2784] [ 72.208793][ T2784] Reported by Kernel Concurrency Sanitizer on: 04:55:01 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb01500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:01 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) r2 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 72.214942][ T2784] CPU: 1 PID: 2784 Comm: udevd Tainted: G W 6.9.0-rc4-syzkaller-00031-g96fca68c4fbf #0 [ 72.225969][ T2784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 72.236020][ T2784] ================================================================== 04:55:01 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:55:01 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) 04:55:01 executing program 1: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000064790000b7030000000003808500000083000000bc09000000000000e5090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095000000000000002b645228decca92745e06985251167ade62d7d0c03517e946ad50159e70e73eba33c2d71cb2195a6692ce335a7f5d1b39776c145212d663f733dba07a34d0b78df67c8e7e1595fda21e2569efebf8e40b94d23095e71269720aead33dca232dc9dd015558161a5e65b251ee1f9e88cc649099b9c60f1b096078748320b89000000000000000097aea5d14608bf118d27cba8eb0d379ed818fb25e50ea479ccc0d75f396cb68aab5326e50e5c158a1dc8db4328"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) [ 72.270072][ T5824] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 04:55:01 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_clone(0x2492a400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) setns(r3, 0x66020000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) syz_io_uring_setup(0xacc, &(0x7f0000001080)={0x0, 0x23f3, 0x100, 0x3, 0xca, 0x0, r3}, &(0x7f0000001100), &(0x7f0000001140)) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=[&(0x7f0000000780)='g\\B\xc6+\xd5\xb9\x93L\\\x87\x84K\xb9!\x03X =z\\\x14\xec*\xed\xa6u\xc4\x14=\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\a\xf9\x18\xe4\xf6f\xd6\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1dC\xba2\xa6u\x14\x0ee\xef\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5bP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\xa1w,\xc7\x15oA\xc5m\xbb\x15\xd1\x1e\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4moccU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xacd\x9d=d\xae\xbf\xd7K\x9do)p\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xf3\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\x05\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xa8\xc8\x18\x00\x00\x00\xc4w', &(0x7f0000002a00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K9\"\xf1@\a\xea\xbb\xfe\x9cY\xfc\x80\x99\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7\xf7\xff]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\x0e0\xfe\xc7\xf9\xde\xd6\xe6\x14O\xc8\xff7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\x1f\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\xeb\x1a\x18\xf1h\x04\xa8\xe8\x92\xe6\xbc\xe1O\xcf', &(0x7f0000001e80)='gcB\xc6+[;\x88\xfe\x97B*[\a\x03\x96l\x1e\b\xd9\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX c\x03\x00\x00\x00\x00\x00\x00\x00\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\xd9\x10#\xf5b|i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8f_\xda8l\xc8\xa2\xb0\xd1t\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c1\xf1\xe7m\xfd\x00\x00\x00\x00\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&\x9c\xbd\xbb\x90\x17$\x9e\\\xee\xc6\x88?)\r@e*\"_^xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xb0\x11i\xcc\xb9BG\x1ac\xbc\xd9&\xb6\xd9\x04\x03\xc6\xebf\x84\xe5\xfe[\xe7\xe6\xb3\xe9\xca\xe7\xc1\xa7\x9aO\xc1\t\x1c\xeb\xfbl\xa4\x80KQG\x80\xcd\xdd\t\x91\xdb}\xb1\xde\xf9\xbe=\x8b\xde\xf2G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xa9\x99t\x87 \x9f\x03}\x8d\x1b\x14\x1eU.r\xe1\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!3\xf2\x84\xa9H\x92\x1e4\"u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6 \x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJ9\x13V\x1e\b\x16\xf6/\xc3{h\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\x1f\x02)sP%Z\xad\x83\xda\xbe2r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xafd\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91_]\xb26\xbf\x9cA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10`xb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0\xd8k\xb7vo?1H\x86\x032\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xf2\a\x00\x00\x00\x00\x00\x00\x00\x00\x13\x9eX$\xe1\x00\x00\x00\x00\x00\x00\x003\xe0\xe3\x0e\xaa\x8e\x9a\x1f\x12\fRw\x11B\x17xOO\xb44L`\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf\xab', &(0x7f00000012c0)='gcB\xc6+\xbf\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0vl\v\x03\b\xadT\a\x14\xd7\xd7\xb5\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m\xb3\fv\xc5\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xdf\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd1\x91]]\xb26\xbfA\x96\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x16\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5^\xf5\x05\xec\xa3\x98\f1\t\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x01\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\x1b\xd0\xfdY\\d\x03(\x89\xe7\xe1G\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf\n\xd5\xad\x15^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9cn0\xdd\x7f\x85^\xdf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`DK\x17\xe9s2\xe0\xe2[IZS5\xa9\x00\x00\x00\x00\x00\xd5\x84\xc4\x91d\\L\xa0|o\xa9\"f\x9ah\xbda~H\xdf\xaf\xa1c\x83+\x00\xb5t\xc28\xb9\x15\xb1\r[g\xab\x1f\xe74N\xa1\xbe\'x\xf7\xfe\xd3=\xfa\nP\xf8\x89M\xd2\xefk.\xaa.\xc3\xddmr\xa3f\t\xfcC\xd7\xc8\xde\xbb\xa6\xf0\x06\xca\xbb\xf4\x0f\xfd\xc1\xca\xd9\x1d\xf0\x12\x94\x02\xdc\xe5`\xfc\x92_\xfe\x82\xcf\xc4\xa1\x8f\x95\xf9e\xbd$\x93V\xf0\xd6\xd9iu\x1d\x00\x00\x00\x00\xed\x9f\n\'\x00\x00\x00\x00\x00\x00\x00\x00x(\xbd\xfd.\xb1I<\xc31H\xe37\xecM:\xc0N\xdd\x81\xb0g\xf7;I)\xff\xc0\x8d|\x14D\xb2L2\xa4\xacBg=\xb8\xe9\xd0zh\x1d\x1d\xa0\xc8\xacJ\xf2\xe8W\xd9\xa9+6V!\x94\xbd\xec\xac\xad\x8cY\x05\xc4e\xdfc\x9a\xa4u\xad\x01\xf8:\xc0\xea\xae\xd4\xf66A\xf9\x15\xb5]\xf9\x18)v%?g6j\xdd\xd4\xe8\x98\xa3\xbaoi\x802\xd1\xfaZ\xf3!\x983\xb1\xfbH\x9a\x94\xf0\xf0l\xdd[\x99\x9f\x8ftPO`z\x94\xdd\x04_-u\x1aP>W3\xbc\xc9\x9fw<\x97C\xa8\x90\xf0\xe7\xfeUN\xeb\xf7\xf06\xc2\xd8l\x14\xd9>\xa27[R\x02K\x82\x01\x10\x16\x93\'\xafL\x81\x8c\xef\"\x1a\xa8\x15*u\xbb\xbc7u}\x877\xa5s[\x13\xa6\x99Iv~\xf4`+\xdf\xe2\xd1\xfe\x03\b\xcf\x81\xd6\xc5\xcb\xb6\x7f\x8a\xbf#\xc4\xdbq\xd0J\x862iG\xfc\x7fIl\xb9!\x0e\x14\xdcLor\xeb\x16D\x83\xf2f\xfb\at\xd8F\x12\xbe-\n\x04k\x01k\xd7?\x03~h\x9a\b\xae\x1b\xd1\xb2\xbd\xe8\x1c\x8d\xcd\xcbUh\xf6\xfd\xd3\x9c\x06\xd7\x99\t\x0e\xdc\x11\x15\r\x8a\x86X\xdfq\xb2\xc2\x12(\xab\xd2\xca\xd0\x05\xe3u\xfbM\xe0\xf9\xd8\x98\x8b91\x9cJH\xd3\x9c\xd2\xa9\x80M\x96\"\x01\b\xfc\x9a\n\v\x19}?\f\xb6\xd4w\x12r\xba\x90!\xd40\xdaA\x82b\x92\x9f_\xe9\xf5\xba\xf3k\xe4\x9f\xa4\xfd\x15\xa5::\x86\xa7>\xabU\xa5\xe9{Yh\xec\xe9\x14\x12\x19\xb0\x93s\xb6\xe3\x15\xdd\xd4\xf9~$)\xf5\x95\xabU\xec\xc3\xa0!Ac\xe80xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r6, &(0x7f00000002c0)=ANY=[], 0x200002e6) sendfile(r6, r5, 0x0, 0x0) 04:55:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:55:01 executing program 1: socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r3, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:55:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000000000000000000000000000005"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 72.377949][ T5842] loop1: detected capacity change from 0 to 512 [ 72.385890][ T5842] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 72.399422][ T5842] EXT4-fs (loop1): 1 truncate cleaned up [ 72.405160][ T5842] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:55:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r2, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:55:01 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$VT_ACTIVATE(r0, 0x5606, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000a) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, r4}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000c80)={0x2, 0x4e24, @empty}, 0x10) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x59}, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) openat2(r7, &(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x11}, 0xfed4) 04:55:01 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:01 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) [ 72.455675][ T5842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5842 comm=syz-executor.1 [ 72.475766][ T5842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5842 comm=syz-executor.1 04:55:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, 0x0, 0x0) 04:55:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) [ 72.545510][ T3621] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 72.576146][ T5861] loop0: detected capacity change from 0 to 512 [ 72.584723][ T5861] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode 04:55:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) getegid() openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 04:55:02 executing program 1: socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) r2 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 72.608207][ T5861] EXT4-fs (loop0): 1 truncate cleaned up [ 72.613944][ T5861] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 72.642508][ T4890] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:55:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000000000000000000000000000005"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r2, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:55:02 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:55:02 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r4, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(r0, 0x0, 0x0) 04:55:02 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1d1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001b000d00000000000000000001000000180003801400002728306a7be5288ca731ab00fe8000000040000000000000000000aa"], 0x2c}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x840) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)=ANY=[@ANYRES8=r2], 0x130}}, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000700)={'#! ', '', [{0x20, 'rfdno'}, {0x20, '\x00'}], 0xa, "9f668e9d74680de1daec3811ef49480b82d338e0db025c761ed51ad68d6e3992660939acee6397860865dc8ce248df338856f3134004bb91b5d1639b92b11edbed3dd24f0233d400"/81}, 0x5d) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r4, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write(r3, &(0x7f0000000000)="02", 0x35a63c) [ 72.873841][ T5882] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 72.888435][ T5884] loop1: detected capacity change from 0 to 512 [ 72.953497][ T5884] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 73.044875][ T5884] EXT4-fs (loop1): 1 truncate cleaned up [ 73.050554][ T5884] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:55:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) [ 73.144833][ T3621] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:55:02 executing program 4: socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) r2 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:55:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r2, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:55:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000000000000000000000000000005"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:02 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:55:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) r2 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:55:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) 04:55:02 executing program 0: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:55:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8cfffffb702000008000000b70300003412000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) 04:55:02 executing program 3: socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080026bd7000000000001000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990000000000bfb4af84"], 0x28}, 0x1, 0x0, 0x0, 0x8850}, 0x4000000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00012bbd7000fcdbdf25020000000800060009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r3, 0x29, 0x0, 0x0, 0xfffffff8, 0x8, @local, @private2, 0x7810, 0x0, 0x3ff, 0xe5d}}) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x28) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc6e48aa31086b8700250000007ea60264160af36504001400040019008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 04:55:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) r2 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:55:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r2, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) 04:55:03 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 04:55:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000002100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="250900000000000000000700000208000300", @ANYRES32=r3], 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a0001000000000000000000020000000001"], 0x24}}, 0x0) gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$FICLONE(r9, 0x40049409, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x81, 0x524, &(0x7f0000002540)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000002040), 0x210000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 04:55:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x4, 0x0, 0x0, 0xb10b, 0x9e92d257392b1fdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x7f, 0xf0, 0x1, 0x1204, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000000000000000000000000000005040000"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xf, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) sendto$inet(r5, &(0x7f0000000040)='\v\x00', 0x2, 0x0, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) r7 = socket$inet(0xa, 0x801, 0x84) connect$inet(r7, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r7, 0x8) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) sendto$inet(r8, &(0x7f0000000200)='5', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x10001, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)='L'}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r9, &(0x7f00000007c0), 0x0}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 73.681319][ T5913] loop3: detected capacity change from 0 to 512 [ 73.699588][ T5913] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode 04:55:03 executing program 1: socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) r1 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 73.739005][ T5913] EXT4-fs (loop3): 1 truncate cleaned up [ 73.744792][ T5913] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 73.765612][ T5913] selinux_netlink_send: 4 callbacks suppressed [ 73.765626][ T5913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5913 comm=syz-executor.3 04:55:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @loopback, {[@noop, @timestamp={0x44, 0x10, 0xdf, 0x0, 0x7, [0x7, 0x2, 0x6]}]}}}}}, 0x52) [ 73.791788][ T5913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=5913 comm=syz-executor.3 [ 73.814451][ T3093] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:55:03 executing program 1: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x0, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x26) mount$bind(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00), 0x4000, 0x0) r4 = openat$vcs(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000d40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={@map=0x1, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0xb, 0x1003, &(0x7f0000001e40)=""/4099}, 0x90) 04:55:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffe, "00207d2000000000201b14700c1e0ac74f000000001200000000000900"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'ip6erspan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100), 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0x10d}], 0x1, 0x33, 0x0) [ 74.028084][ T5925] loop0: detected capacity change from 0 to 512 04:55:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r2, @ANYBLOB="400002803c000100240001006d6f6465000000000000000000000000000000000d0000000000000000000000050003000500000004015e346bf065d36d466c840b00040072616e646f6d0000"], 0x5c}}, 0x0) [ 74.124873][ T5925] EXT4-fs (loop0): blocks per group (95) and clusters per group (32768) inconsistent 04:55:03 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) r2 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0xffff}, 0x10007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:55:03 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:55:03 executing program 1: socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@block_validity}, {@quota}]}, 0x3, 0x431, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085b8063f3689cefed5010000202069250000ae6327ce20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b72100000000400085000000710000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB='(\x00\x00\x00', @A